Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-43804 (GCVE-0-2023-43804)
Vulnerability from cvelistv5 – Published: 2023-10-04 16:01 – Updated: 2025-11-03 21:49- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-03T21:49:44.074Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f"
},
{
"name": "https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb"
},
{
"name": "https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/"
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3"
},
{
"url": "https://security.netapp.com/advisory/ntap-20241213-0007/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00020.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "urllib3",
"vendor": "urllib3",
"versions": [
{
"status": "affected",
"version": "\u003e= 2.0.0, \u003c 2.0.6"
},
{
"status": "affected",
"version": "\u003c 1.26.17"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-03T21:06:26.816Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f"
},
{
"name": "https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb"
},
{
"name": "https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/"
}
],
"source": {
"advisory": "GHSA-v845-jxx5-vc9f",
"discovery": "UNKNOWN"
},
"title": "`Cookie` HTTP header isn\u0027t stripped on cross-origin redirects"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-43804",
"datePublished": "2023-10-04T16:01:50.447Z",
"dateReserved": "2023-09-22T14:51:42.340Z",
"dateUpdated": "2025-11-03T21:49:44.074Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.26.17\", \"matchCriteriaId\": \"97C54576-30ED-41C6-817B-E40030A06A69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.0.0\", \"versionEndExcluding\": \"2.0.6\", \"matchCriteriaId\": \"59C45894-31CB-46E5-B085-986EC7223245\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.\"}, {\"lang\": \"es\", \"value\": \"urllib3 es una librer\\u00eda cliente HTTP f\\u00e1cil de usar para Python. urllib3 no trata el encabezado HTTP \\\"Cookie\\\" de manera especial ni proporciona ayuda para administrar las cookies a trav\\u00e9s de HTTP, eso es responsabilidad del usuario. Sin embargo, es posible que un usuario especifique un encabezado \\\"Cookie\\\" y, sin saberlo, filtre informaci\\u00f3n a trav\\u00e9s de redireccionamientos HTTP a un origen diferente si ese usuario no deshabilita los redireccionamientos expl\\u00edcitamente. Este problema se solucion\\u00f3 en urllib3 versi\\u00f3n 1.26.17 o 2.0.5.\"}]",
"id": "CVE-2023-43804",
"lastModified": "2024-12-13T14:15:20.570",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.7, \"impactScore\": 5.2}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.2}]}",
"published": "2023-10-04T17:15:10.163",
"references": "[{\"url\": \"https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20241213-0007/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-43804\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-10-04T17:15:10.163\",\"lastModified\":\"2025-11-03T22:16:27.767\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.\"},{\"lang\":\"es\",\"value\":\"urllib3 es una librer\u00eda cliente HTTP f\u00e1cil de usar para Python. urllib3 no trata el encabezado HTTP \\\"Cookie\\\" de manera especial ni proporciona ayuda para administrar las cookies a trav\u00e9s de HTTP, eso es responsabilidad del usuario. Sin embargo, es posible que un usuario especifique un encabezado \\\"Cookie\\\" y, sin saberlo, filtre informaci\u00f3n a trav\u00e9s de redireccionamientos HTTP a un origen diferente si ese usuario no deshabilita los redireccionamientos expl\u00edcitamente. Este problema se solucion\u00f3 en urllib3 versi\u00f3n 1.26.17 o 2.0.5.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.7,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.26.17\",\"matchCriteriaId\":\"97C54576-30ED-41C6-817B-E40030A06A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndExcluding\":\"2.0.6\",\"matchCriteriaId\":\"59C45894-31CB-46E5-B085-986EC7223245\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"}]}]}],\"references\":[{\"url\":\"https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/12/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3PR7C6RJ6JUBQKIJ644DMIJSUP36VDY/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAGZXYJ7H2G3SB47M453VQVNAWKAEJJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20241213-0007/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2023-AVI-0956
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | N/A | Splunk extension pour Google Cloud Platform versions antérieures à 4.3.0 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.2 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.7 | ||
| Splunk | N/A | Splunk extension pour Amazon Web Services versions antérieures à 7.2.0 | ||
| Splunk | N/A | Splunk Cloud versions antérieures à 9.1.2308 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk extension pour Google Cloud Platform versions ant\u00e9rieures \u00e0 4.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.2",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.7",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk extension pour Amazon Web Services versions ant\u00e9rieures \u00e0 7.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.1.2308",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2023-46213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46213"
},
{
"name": "CVE-2023-46214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46214"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2022-31799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31799"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0956",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-11-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Splunk\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et une injection\nde code indirecte \u00e0 distance (XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1105 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1105"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1101 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1101"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1102 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1102"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1106 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1106"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1103 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1103"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1104 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1104"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1107 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1107"
}
]
}
CERTFR-2024-AVI-0903
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | WebSphere Application Server Liberty versions 20.0.12 à 24.0.0.10 sans le correctif de sécurité PH63533 ou antérieures à 24.0.0.11 (disponibilité prévue pour le dernier trimestre 2024) | ||
| IBM | N/A | QRadar Incident Forensics versions 7.5.x antérieures à 7.5.0 UP10 | ||
| IBM | N/A | Storage Protect Server versions 8.1.x antérieures à 8.1.24 | ||
| IBM | N/A | Robotic Process Automation pour Cloud Pak versions 23.0.x antérieures à 23.0.18 | ||
| IBM | N/A | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 | ||
| IBM | N/A | Robotic Process Automation versions 21.0..0.x antérieures à 21.0.7.18 | ||
| IBM | N/A | Robotic Process Automation versions 23.0.x antérieures à 23.0.18 | ||
| IBM | N/A | Robotic Process Automation pour Cloud Pak versions 21.0.0.x antérieures à 21.0.7.18 | ||
| IBM | N/A | QRadar Network Capture versions 7.5.x antérieures à 7.5.0 Update Package 10 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere Application Server Liberty versions 20.0.12 \u00e0 24.0.0.10 sans le correctif de s\u00e9curit\u00e9 PH63533 ou ant\u00e9rieures \u00e0 24.0.0.11 (disponibilit\u00e9 pr\u00e9vue pour le dernier trimestre 2024)",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Incident Forensics versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Storage Protect Server versions 8.1.x ant\u00e9rieures \u00e0 8.1.24",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation pour Cloud Pak versions 23.0.x ant\u00e9rieures \u00e0 23.0.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation versions 21.0..0.x ant\u00e9rieures \u00e0 21.0.7.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation versions 23.0.x ant\u00e9rieures \u00e0 23.0.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation pour Cloud Pak versions 21.0.0.x ant\u00e9rieures \u00e0 21.0.7.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Network Capture versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 Update Package 10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2023-25577",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25577"
},
{
"name": "CVE-2023-37536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-26974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2023-20592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20592"
},
{
"name": "CVE-2018-1311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1311"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2020-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25219"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2023-52878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2024-5564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
},
{
"name": "CVE-2023-23934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2024-31881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31881"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-26859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
},
{
"name": "CVE-2022-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38725"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-31880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31880"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2021-47311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
},
{
"name": "CVE-2024-28762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28762"
},
{
"name": "CVE-2021-45429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45429"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2020-7212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7212"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2021-47073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47073"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2024-28786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28786"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2021-47236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
},
{
"name": "CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-32487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-35888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2023-46136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2021-46972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46972"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2023-29267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29267"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-46329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2020-26154",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26154"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2023-30861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30861"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-26982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
},
{
"name": "CVE-2021-47310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
},
{
"name": "CVE-2023-52626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2021-47456",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47456"
},
{
"name": "CVE-2024-28752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28752"
},
{
"name": "CVE-2021-47356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2021-47353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47353"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2021-46909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46909"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0903",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173421",
"url": "https://www.ibm.com/support/pages/node/7173421"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173043",
"url": "https://www.ibm.com/support/pages/node/7173043"
},
{
"published_at": "2024-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173420",
"url": "https://www.ibm.com/support/pages/node/7173420"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173226",
"url": "https://www.ibm.com/support/pages/node/7173226"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173224",
"url": "https://www.ibm.com/support/pages/node/7173224"
},
{
"published_at": "2024-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173097",
"url": "https://www.ibm.com/support/pages/node/7173097"
}
]
}
CERTFR-2023-AVI-1055
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF03
- IBM Sterling B2B Integrator versions 6.0.0.x antérieures à 6.0.3.9
- IBM Sterling B2B Integrator versions 6.1.0.x antérieures à 6.1.0.8
- IBM Sterling B2B Integrator versions 6.1.1.x antérieures à 6.1.1.4
- IBM Sterling B2B Integrator versions 6.1.2.x antérieures à 6.1.2.3
- IBM Sterling B2B Integrator versions 6.1.2.x antérieures à 6.2.0.0
- IBM AIX version 7.3
- IBM AIX version 7.2
- IBM VIOS version 4.1
- IBM VIOS version 3.1
Se référer aux bulletin de l'éditeur pour les versions des fichiers vulnérables (cf. section Documentation).
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eIBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF03\u003c/li\u003e \u003cli\u003eIBM Sterling B2B Integrator versions 6.0.0.x ant\u00e9rieures \u00e0 6.0.3.9\u003c/li\u003e \u003cli\u003eIBM Sterling B2B Integrator versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.8\u003c/li\u003e \u003cli\u003eIBM Sterling B2B Integrator versions 6.1.1.x ant\u00e9rieures \u00e0 6.1.1.4\u003c/li\u003e \u003cli\u003eIBM Sterling B2B Integrator versions 6.1.2.x ant\u00e9rieures \u00e0 6.1.2.3\u003c/li\u003e \u003cli\u003eIBM Sterling B2B Integrator versions 6.1.2.x ant\u00e9rieures \u00e0 6.2.0.0\u003c/li\u003e \u003cli\u003eIBM AIX version 7.3\u003c/li\u003e \u003cli\u003eIBM AIX version 7.2\u003c/li\u003e \u003cli\u003eIBM VIOS version 4.1\u003c/li\u003e \u003cli\u003eIBM VIOS version 3.1\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer aux bulletin de l\u0027\u00e9diteur pour les versions des fichiers vuln\u00e9rables (cf. section Documentation).\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-1436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1436"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-34040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34040"
},
{
"name": "CVE-2022-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40149"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2022-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40150"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-40787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40787"
},
{
"name": "CVE-2022-45693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45693"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2022-45685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45685"
},
{
"name": "CVE-2023-41835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41835"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2023-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41080"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-47146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47146"
},
{
"name": "CVE-2023-32233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-1055",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-12-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance,\u00a0un d\u00e9ni de\nservice \u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7099297 du 18 d\u00e9cembre 2023",
"url": "https://www.ibm.com/support/pages/node/7099862"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7101062 du 21 d\u00e9cembre 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7099862 du 19 d\u00e9cembre 2023",
"url": "https://www.ibm.com/support/pages/node/7101062"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7099313 du 18 d\u00e9cembre 2023",
"url": "https://www.ibm.com/support/pages/node/7099313"
}
]
}
CERTFR-2025-AVI-0481
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cloud Pak for Security versions 1.10.x ant\u00e9rieures \u00e0 1.11.3.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions post\u00e9rieures \u00e0 1.10.12.0 et ant\u00e9rieures \u00e0 1.11.3.0 ",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-32996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32996"
},
{
"name": "CVE-2019-11038",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11038"
},
{
"name": "CVE-2021-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38593"
},
{
"name": "CVE-2025-1334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1334"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-0793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0793"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2024-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-11831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
},
{
"name": "CVE-2025-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2023-52355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2025-32997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32997"
},
{
"name": "CVE-2024-9902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9902"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-56332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56332"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2024-38827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38827"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2025-25019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25019"
},
{
"name": "CVE-2020-35538",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35538"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2018-5711",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5711"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2025-25022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25022"
},
{
"name": "CVE-2025-25020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25020"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2025-25021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25021"
},
{
"name": "CVE-2024-52304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52304"
},
{
"name": "CVE-2023-24607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24607"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2024-57556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57556"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2023-24056",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-52317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52317"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0481",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-06T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-06-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7235432",
"url": "https://www.ibm.com/support/pages/node/7235432"
},
{
"published_at": "2025-06-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7235402",
"url": "https://www.ibm.com/support/pages/node/7235402"
}
]
}
CERTFR-2024-AVI-0741
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Secure Analytics. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions antérieures à 7.5.0 UP9 IF02 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP9 IF02",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2024-42472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42472"
},
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-4692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4692"
},
{
"name": "CVE-2024-27059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27059"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-26974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
},
{
"name": "CVE-2024-26897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
},
{
"name": "CVE-2021-47055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47055"
},
{
"name": "CVE-2020-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36777"
},
{
"name": "CVE-2023-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43788"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2023-52878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
},
{
"name": "CVE-2021-47185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47185"
},
{
"name": "CVE-2024-23650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23650"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2024-5564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2024-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2024-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2022-3287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3287"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-26859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
},
{
"name": "CVE-2020-13936",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3652"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2023-45802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45802"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2021-47311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2024-26643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26643"
},
{
"name": "CVE-2024-26779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
},
{
"name": "CVE-2024-32021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32021"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24806"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2024-27048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27048"
},
{
"name": "CVE-2021-47013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2021-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-47073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47073"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2022-48627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
},
{
"name": "CVE-2021-47171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47171"
},
{
"name": "CVE-2024-26743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26743"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2021-47236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2024-32004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32004"
},
{
"name": "CVE-2021-47118",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47118"
},
{
"name": "CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-32020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32020"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-32487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2021-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47153"
},
{
"name": "CVE-2024-35888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2023-31122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31122"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2019-14865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14865"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2024-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2357"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-26919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26919"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-3019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3019"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2024-32465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32465"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-43789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43789"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2023-4693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4693"
},
{
"name": "CVE-2021-46972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46972"
},
{
"name": "CVE-2023-52578",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2021-46934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46934"
},
{
"name": "CVE-2024-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1048"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26693"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2023-52610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2022-39253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39253"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-26872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26872"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2024-26982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
},
{
"name": "CVE-2021-47310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
},
{
"name": "CVE-2023-52626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2024-26744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26744"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2021-47456",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47456"
},
{
"name": "CVE-2021-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
},
{
"name": "CVE-2024-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
},
{
"name": "CVE-2022-48669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48669"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2021-47356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
},
{
"name": "CVE-2024-26694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26694"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2021-47353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47353"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2018-25091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25091"
},
{
"name": "CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2021-46909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46909"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0741",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-05T00:00:00.000000"
},
{
"description": "Ajout r\u00e9f\u00e9rence \u00e9diteur",
"revision_date": "2024-09-06T00:00:00.000000"
},
{
"description": "Correction d\u0027identifiants CVE erron\u00e9s",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Secure Analytics. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Secure Analytics",
"vendor_advisories": [
{
"published_at": "2024-09-30",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA86686",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP9-IF02"
}
]
}
CERTFR-2024-AVI-0385
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.2.x antérieures à 6.2.0.23 | ||
| IBM | N/A | AIX et VIOS sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions antérieures à 6.1.0.24 | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.4.0 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.7 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP8 IF02 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX et VIOS sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions ant\u00e9rieures \u00e0 6.1.0.24",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.7",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP8 IF02",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
},
{
"name": "CVE-2023-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4732"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2023-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2024-27273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27273"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-51043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51043"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-45688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45688"
},
{
"name": "CVE-2022-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-10001",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10001"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2021-33503",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2022-45884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45884"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-33951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33951"
},
{
"name": "CVE-2024-28102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28102"
},
{
"name": "CVE-2023-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2163"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-45862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45862"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2020-3898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3898"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2023-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-31084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
},
{
"name": "CVE-2023-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2023-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2023-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
},
{
"name": "CVE-2023-33203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
},
{
"name": "CVE-2023-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3812"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-27269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27269"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2018-19787",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19787"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1252"
},
{
"name": "CVE-2023-44794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44794"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-33952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33952"
},
{
"name": "CVE-2023-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32324"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2014-3146",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3146"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-3161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3161"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2023-45871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-28772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28772"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2023-1075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-45887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2024-26130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2023-34241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34241"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2023-4622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4622"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2023-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2021-33631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2023-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0597"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-7192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2023-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2021-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2166"
},
{
"name": "CVE-2023-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1192"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0385",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150297 du 06 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150297"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150684 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150684"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150803 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150803"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150277 du 05 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150277"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150196 du 03 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150196"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150798 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150798"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150804 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150799 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150799"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150276 du 05 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150276"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150802 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150802"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150362 du 07 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150362"
}
]
}
CERTFR-2024-AVI-0878
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.2.x antérieures à 9.2.3 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.1.x antérieures à 9.1.6 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.3.x antérieures à 9.3.1 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2308.x antérieures à 9.1.2308.208 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.205 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2403.x antérieures à 9.2.2403.108 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Entreprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.3",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2308.x ant\u00e9rieures \u00e0 9.1.2308.208",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.205",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2403.x ant\u00e9rieures \u00e0 9.2.2403.108",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2017-14159",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14159"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2020-36230",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36230"
},
{
"name": "CVE-2024-45733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45733"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2020-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36221"
},
{
"name": "CVE-2024-45731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45731"
},
{
"name": "CVE-2019-13057",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13057"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-29401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29401"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2015-3276",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3276"
},
{
"name": "CVE-2020-36225",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36225"
},
{
"name": "CVE-2024-45739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45739"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2020-36224",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36224"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2021-27212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27212"
},
{
"name": "CVE-2020-36228",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36228"
},
{
"name": "CVE-2020-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36227"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2020-15719",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15719"
},
{
"name": "CVE-2024-45740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45740"
},
{
"name": "CVE-2024-45736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45736"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-39320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
},
{
"name": "CVE-2017-17740",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17740"
},
{
"name": "CVE-2024-45741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45741"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2020-36223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36223"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-45737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45737"
},
{
"name": "CVE-2020-36229",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36229"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-45732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45732"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-45735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45735"
},
{
"name": "CVE-2023-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50658"
},
{
"name": "CVE-2023-47108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47108"
},
{
"name": "CVE-2023-26125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26125"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-45738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45738"
},
{
"name": "CVE-2020-36226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36226"
},
{
"name": "CVE-2020-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36222"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2022-42969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42969"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2019-13565",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13565"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-45734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45734"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0878",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1008",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1008"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1005",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1005"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1006",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1006"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1002",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1002"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1003",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1003"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1007",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1007"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1004",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1004"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1010",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1010"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1011",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1011"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1012",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1012"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1009",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1009"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1001",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1001"
}
]
}
CERTFR-2025-AVI-0303
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk SDK for JavaScript | Splunk SDK for JavaScript versions antérieures à 2.0.1 | ||
| Splunk | Splunk Connect for Syslog | Splunk Connect for Syslog versions antérieures à 3.34.3 | ||
| Splunk | N/A | Splunk sans les derniers correctifs de sécurité |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk SDK for JavaScript versions ant\u00e9rieures \u00e0 2.0.1",
"product": {
"name": "Splunk SDK for JavaScript",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Connect for Syslog versions ant\u00e9rieures \u00e0 3.34.3",
"product": {
"name": "Splunk Connect for Syslog",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2024-53899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53899"
},
{
"name": "CVE-2024-52804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52804"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0303",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0408",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0408"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0417",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0417"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0404",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0404"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0413",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0413"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0407",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0407"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0415",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0415"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0409",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0409"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0406",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0406"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0414",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0414"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0403",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0403"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0411",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0411"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0410",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0410"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0416",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0416"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0412",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0412"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0405",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0405"
}
]
}
CERTFR-2024-AVI-0074
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Unix versions 6.3.x.x antérieures à 6.3.0.2.iFix005 | ||
| IBM | QRadar Deployment Intelligence App | IBM QRadar Deployment Intelligence App versions antérieures à 3.0.12 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Unix versions 6.2.x.x antérieures à 6.2.0.7.iFix005 | ||
| IBM | QRadar | IBM SOAR QRadar Plugin App versions antérieures à 5.3.1 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Unix versions 6.0.x.x antérieures à 6.0.0.2.iFix159 | ||
| IBM | Storage Protect | IBM Storage Protect Plus vSnap versions 10.1.x antérieures à 10.1.15.3 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Unix versions 6.1.x.x antérieures à 6.1.0.4.iFix099 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct pour Unix versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.2.iFix005",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.12",
"product": {
"name": "QRadar Deployment Intelligence App",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Unix versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.7.iFix005",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.3.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Unix versions 6.0.x.x ant\u00e9rieures \u00e0 6.0.0.2.iFix159",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Storage Protect Plus vSnap versions 10.1.x ant\u00e9rieures \u00e0 10.1.15.3",
"product": {
"name": "Storage Protect",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Unix versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.4.iFix099",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-4004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38020"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2023-46136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2023-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38019"
},
{
"name": "CVE-2023-47148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47148"
},
{
"name": "CVE-2023-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38263"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111880 du 24 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7111880"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111720 du 22 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7111720"
}
],
"reference": "CERTFR-2024-AVI-0074",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111720 du 24 janvier 2024",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7096482 du 22 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7096482"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111880 du 25 janvier 2024",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111679 du 24 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7111679"
}
]
}
CERTFR-2024-AVI-0579
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | Spectrum Control versions antérieures à 5.4.12 | ||
| IBM | WebSphere | WebSphere Application Server versions 8.5.x antérieures à 8.5.5.25 sans le correctif de sécurité PH61489 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.x antérieures à 9.0.5.20 sans le correctif de sécurité PH61489 | ||
| IBM | QRadar | QRadar Deployment Intelligence App versions antérieures à 3.0.14 | ||
| IBM | QRadar | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP9 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions antérieures à 1.10.23.0 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 sans le correctif de sécurité 9211224a.240708.epkg.Z | ||
| IBM | QRadar | QRadar Suite Software versions antérieures à 1.10.23.0 | ||
| IBM | QRadar | Security QRadar EDR versions antérieures à 3.12.9 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 sans le correctif de sécurité 9211224a.240708.epkg.Z | ||
| IBM | QRadar | QRadar WinCollect Agent versions antérieures à 10.1.11 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Spectrum Control versions ant\u00e9rieures \u00e0 5.4.12",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.5.25 sans le correctif de s\u00e9curit\u00e9 PH61489",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 9.0.x ant\u00e9rieures \u00e0 9.0.5.20 sans le correctif de s\u00e9curit\u00e9 PH61489",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.14",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP9",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions ant\u00e9rieures \u00e0 1.10.23.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 sans le correctif de s\u00e9curit\u00e9 9211224a.240708.epkg.Z",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.10.23.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions ant\u00e9rieures \u00e0 3.12.9",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 sans le correctif de s\u00e9curit\u00e9 9211224a.240708.epkg.Z",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar WinCollect Agent versions ant\u00e9rieures \u00e0 10.1.11",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2024-1597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2024-35154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35154"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2024-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3772"
},
{
"name": "CVE-2023-50312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50312"
},
{
"name": "CVE-2024-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
},
{
"name": "CVE-2024-28102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28102"
},
{
"name": "CVE-2024-34069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2024-34997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34997"
},
{
"name": "CVE-2022-3287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3287"
},
{
"name": "CVE-2020-13936",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2023-45802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45802"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2024-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34062"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
},
{
"name": "CVE-2024-28176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
},
{
"name": "CVE-2024-1135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1135"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2379"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-31122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31122"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-51775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-3019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3019"
},
{
"name": "CVE-2024-5206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5206"
},
{
"name": "CVE-2024-27088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27088"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2023-44483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44483"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27270"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2024-6387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
},
{
"name": "CVE-2024-25023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25023"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2021-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0579",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159768",
"url": "https://www.ibm.com/support/pages/node/7159768"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160017",
"url": "https://www.ibm.com/support/pages/node/7160017"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159781",
"url": "https://www.ibm.com/support/pages/node/7159781"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160014",
"url": "https://www.ibm.com/support/pages/node/7160014"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160134",
"url": "https://www.ibm.com/support/pages/node/7160134"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159771",
"url": "https://www.ibm.com/support/pages/node/7159771"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159867",
"url": "https://www.ibm.com/support/pages/node/7159867"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159865",
"url": "https://www.ibm.com/support/pages/node/7159865"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159527",
"url": "https://www.ibm.com/support/pages/node/7159527"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159825",
"url": "https://www.ibm.com/support/pages/node/7159825"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159934",
"url": "https://www.ibm.com/support/pages/node/7159934"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159920",
"url": "https://www.ibm.com/support/pages/node/7159920"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160013",
"url": "https://www.ibm.com/support/pages/node/7160013"
}
]
}
CERTFR-2024-AVI-0535
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2308.x antérieures à 9.1.2308.209 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.10 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.2 | ||
| Splunk | Universal Forwarder | Universal Forwarder sur Solaris versions 9.0.x antérieures à 9.0.10 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.5 | ||
| Splunk | Universal Forwarder | Universal Forwarder sur Solaris versions 9.2.x antérieures à 9.2.2 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.202 | ||
| Splunk | Universal Forwarder | Universal Forwarder sur Solaris versions 9.1.x antérieures à 9.1.5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Cloud Platform versions 9.1.2308.x ant\u00e9rieures \u00e0 9.1.2308.209",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.10",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.2",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder sur Solaris versions 9.0.x ant\u00e9rieures \u00e0 9.0.10",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder sur Solaris versions 9.2.x ant\u00e9rieures \u00e0 9.2.2",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.202",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder sur Solaris versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
},
{
"name": "CVE-2024-36996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36996"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-36985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36985"
},
{
"name": "CVE-2022-36364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
},
{
"name": "CVE-2024-36989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36989"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2024-36991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36991"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2024-36983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36983"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2024-36992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36992"
},
{
"name": "CVE-2024-36995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36995"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2024-36993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36993"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2024-36984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36984"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-36994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36994"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-36987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36987"
},
{
"name": "CVE-2022-40896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40896"
},
{
"name": "CVE-2024-36986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36986"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-36997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36997"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-36990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36990"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0535",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0711",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0711"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0718",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0718"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0716",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0716"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0709",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0709"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0707",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0707"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0704",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0704"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0710",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0710"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0717",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0717"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0705",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0705"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0715",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0715"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0712",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0712"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0714",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0714"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0703",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0703"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0708",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0708"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0713",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0713"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0706",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0706"
}
]
}
CERTFR-2025-AVI-0279
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | Db2 versions antérieures à 5.1.2 pour Cloud Pak for Data | ||
| IBM | WebSphere | WebSphere Application Server Liberty sans le correctif APAR PH65394 | ||
| IBM | Db2 Warehouse | Db2 Warehouse versions antérieures à 5.1.2 pour Cloud Pak for Data | ||
| IBM | WebSphere | WebSphere Hybrid Edition sans le dernier correctif de sécurité | ||
| IBM | QRadar Analyst Workflow | QRadar Analyst Workflow versions antérieures à 3.0.0 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Db2 versions ant\u00e9rieures \u00e0 5.1.2 pour Cloud Pak for Data",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server Liberty sans le correctif APAR PH65394",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse versions ant\u00e9rieures \u00e0 5.1.2 pour Cloud Pak for Data",
"product": {
"name": "Db2 Warehouse",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Analyst Workflow versions ant\u00e9rieures \u00e0 3.0.0",
"product": {
"name": "QRadar Analyst Workflow",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-37071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37071"
},
{
"name": "CVE-2025-25285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25285"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-34997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34997"
},
{
"name": "CVE-2024-51479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51479"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-41761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41761"
},
{
"name": "CVE-2022-29153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29153"
},
{
"name": "CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2018-6341",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6341"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2025-25288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25288"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2025-25290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25290"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-6484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6484"
},
{
"name": "CVE-2020-13844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13844"
},
{
"name": "CVE-2024-26776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26776"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2024-41762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41762"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2025-23184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23184"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2021-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4204"
},
{
"name": "CVE-2024-26843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26843"
},
{
"name": "CVE-2024-40679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40679"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2018-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
},
{
"name": "CVE-2019-11253",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11253"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2025-25289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25289"
},
{
"name": "CVE-2024-45663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45663"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2024-36620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36620"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0279",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-04-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7230024",
"url": "https://www.ibm.com/support/pages/node/7230024"
},
{
"published_at": "2025-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229770",
"url": "https://www.ibm.com/support/pages/node/7229770"
},
{
"published_at": "2025-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229443",
"url": "https://www.ibm.com/support/pages/node/7229443"
},
{
"published_at": "2025-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229768",
"url": "https://www.ibm.com/support/pages/node/7229768"
},
{
"published_at": "2025-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229772",
"url": "https://www.ibm.com/support/pages/node/7229772"
}
]
}
CERTFR-2024-AVI-0670
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Splunk Machine Learning Toolkit. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Machine Learning Toolkit | Machine Learning Toolkit versions antérieures à 5.4.2 avec un version de Python for Scientific Computing antérieures à 4.2.1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Machine Learning Toolkit versions ant\u00e9rieures \u00e0 5.4.2 avec un version de Python for Scientific Computing ant\u00e9rieures \u00e0 4.2.1 ",
"product": {
"name": "Machine Learning Toolkit",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-31583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31583"
},
{
"name": "CVE-2022-25882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25882"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3772"
},
{
"name": "CVE-2020-28975",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28975"
},
{
"name": "CVE-2024-3568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3568"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-7018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7018"
},
{
"name": "CVE-2024-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34062"
},
{
"name": "CVE-2024-27319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27319"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-27318",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27318"
},
{
"name": "CVE-2022-45907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45907"
},
{
"name": "CVE-2020-28473",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28473"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-6730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6730"
},
{
"name": "CVE-2024-5206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5206"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-31580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31580"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2800"
},
{
"name": "CVE-2022-31799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31799"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-25399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25399"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0670",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk Machine Learning Toolkit. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk Machine Learning Toolkit",
"vendor_advisories": [
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0801",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0801"
}
]
}
CERTFR-2024-AVI-0903
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | WebSphere Application Server Liberty versions 20.0.12 à 24.0.0.10 sans le correctif de sécurité PH63533 ou antérieures à 24.0.0.11 (disponibilité prévue pour le dernier trimestre 2024) | ||
| IBM | N/A | QRadar Incident Forensics versions 7.5.x antérieures à 7.5.0 UP10 | ||
| IBM | N/A | Storage Protect Server versions 8.1.x antérieures à 8.1.24 | ||
| IBM | N/A | Robotic Process Automation pour Cloud Pak versions 23.0.x antérieures à 23.0.18 | ||
| IBM | N/A | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 | ||
| IBM | N/A | Robotic Process Automation versions 21.0..0.x antérieures à 21.0.7.18 | ||
| IBM | N/A | Robotic Process Automation versions 23.0.x antérieures à 23.0.18 | ||
| IBM | N/A | Robotic Process Automation pour Cloud Pak versions 21.0.0.x antérieures à 21.0.7.18 | ||
| IBM | N/A | QRadar Network Capture versions 7.5.x antérieures à 7.5.0 Update Package 10 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere Application Server Liberty versions 20.0.12 \u00e0 24.0.0.10 sans le correctif de s\u00e9curit\u00e9 PH63533 ou ant\u00e9rieures \u00e0 24.0.0.11 (disponibilit\u00e9 pr\u00e9vue pour le dernier trimestre 2024)",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Incident Forensics versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Storage Protect Server versions 8.1.x ant\u00e9rieures \u00e0 8.1.24",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation pour Cloud Pak versions 23.0.x ant\u00e9rieures \u00e0 23.0.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation versions 21.0..0.x ant\u00e9rieures \u00e0 21.0.7.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation versions 23.0.x ant\u00e9rieures \u00e0 23.0.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation pour Cloud Pak versions 21.0.0.x ant\u00e9rieures \u00e0 21.0.7.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Network Capture versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 Update Package 10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2023-25577",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25577"
},
{
"name": "CVE-2023-37536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-26974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2023-20592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20592"
},
{
"name": "CVE-2018-1311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1311"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2020-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25219"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2023-52878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2024-5564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
},
{
"name": "CVE-2023-23934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2024-31881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31881"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-26859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
},
{
"name": "CVE-2022-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38725"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-31880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31880"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2021-47311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
},
{
"name": "CVE-2024-28762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28762"
},
{
"name": "CVE-2021-45429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45429"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2020-7212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7212"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2021-47073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47073"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2024-28786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28786"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2021-47236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
},
{
"name": "CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-32487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-35888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2023-46136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2021-46972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46972"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2023-29267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29267"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-46329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2020-26154",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26154"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2023-30861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30861"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-26982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
},
{
"name": "CVE-2021-47310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
},
{
"name": "CVE-2023-52626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2021-47456",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47456"
},
{
"name": "CVE-2024-28752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28752"
},
{
"name": "CVE-2021-47356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2021-47353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47353"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2021-46909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46909"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0903",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173421",
"url": "https://www.ibm.com/support/pages/node/7173421"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173043",
"url": "https://www.ibm.com/support/pages/node/7173043"
},
{
"published_at": "2024-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173420",
"url": "https://www.ibm.com/support/pages/node/7173420"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173226",
"url": "https://www.ibm.com/support/pages/node/7173226"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173224",
"url": "https://www.ibm.com/support/pages/node/7173224"
},
{
"published_at": "2024-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173097",
"url": "https://www.ibm.com/support/pages/node/7173097"
}
]
}
CERTFR-2025-AVI-0356
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk User Behavior Analytics (UBA). Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk User Behavior Analytics (UBA) | Splunk User Behavior Analytics (UBA) versions 5.4.x antérieures à 5.4.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk User Behavior Analytics (UBA) versions 5.4.x ant\u00e9rieures \u00e0 5.4.2",
"product": {
"name": "Splunk User Behavior Analytics (UBA)",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0356",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk User Behavior Analytics (UBA). Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk User Behavior Analytics (UBA)",
"vendor_advisories": [
{
"published_at": "2025-04-29",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0418",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0418"
}
]
}
CERTFR-2025-AVI-0356
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk User Behavior Analytics (UBA). Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk User Behavior Analytics (UBA) | Splunk User Behavior Analytics (UBA) versions 5.4.x antérieures à 5.4.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk User Behavior Analytics (UBA) versions 5.4.x ant\u00e9rieures \u00e0 5.4.2",
"product": {
"name": "Splunk User Behavior Analytics (UBA)",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0356",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk User Behavior Analytics (UBA). Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk User Behavior Analytics (UBA)",
"vendor_advisories": [
{
"published_at": "2025-04-29",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0418",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0418"
}
]
}
CERTFR-2023-AVI-0956
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | N/A | Splunk extension pour Google Cloud Platform versions antérieures à 4.3.0 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.2 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.7 | ||
| Splunk | N/A | Splunk extension pour Amazon Web Services versions antérieures à 7.2.0 | ||
| Splunk | N/A | Splunk Cloud versions antérieures à 9.1.2308 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk extension pour Google Cloud Platform versions ant\u00e9rieures \u00e0 4.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.2",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.7",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk extension pour Amazon Web Services versions ant\u00e9rieures \u00e0 7.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.1.2308",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2023-46213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46213"
},
{
"name": "CVE-2023-46214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46214"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2022-31799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31799"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0956",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-11-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Splunk\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et une injection\nde code indirecte \u00e0 distance (XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1105 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1105"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1101 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1101"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1102 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1102"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1106 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1106"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1103 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1103"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1104 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1104"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1107 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1107"
}
]
}
CERTFR-2024-AVI-0305
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Sterling Connect:Direct pour UNIX versions 6.1.0.x antérieures à 6.1.0.4.iFix104
- Sterling Connect:Direct pour UNIX versions 6.0.0.x antérieures à 6.0.0.2.iFix163
- Sterling Connect:Direct FTP+ versions antérieures à 1.3.0 sans le correctif de sécurité iFix026
- QRadar App SDK versions 2.2.x antérieures à 2.2.1
- QRadar Deployment Intelligence App versions antérieures à 3.0.13
- Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.20.0
- QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP8 IF01
- QRadar Suite Software versions 1.10.12.x antérieures à 1.10.20.0
- WebSphere Application Server Liberty versions postérieures à 21.0.0.2 et antérieures à 24.0.0.4
- WebSphere Application Server versions 9.x antérieures à 9.0.5.19
- WebSphere Application Server versions postérieures à 8.5.5.2 antérieures à 8.5.5.26
- Sterling B2B Integrator versions 6.0.x.x à 6.1.x.x antérieures à 6.1.2.5
- Sterling B2B Integrator versions 6.2.x.x antérieures à 6.2.0.1
Se référer aux bulletin de l'éditeur pour les versions des fichiers vulnérables (cf. section Documentation).
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eSterling Connect:Direct pour UNIX versions 6.1.0.x ant\u00e9rieures \u00e0\u00a06.1.0.4.iFix104\u003c/li\u003e \u003cli\u003eSterling Connect:Direct pour UNIX versions 6.0.0.x ant\u00e9rieures \u00e0 6.0.0.2.iFix163\u003c/li\u003e \u003cli\u003eSterling Connect:Direct FTP+ versions ant\u00e9rieures \u00e0 1.3.0 sans le correctif de s\u00e9curit\u00e9 iFix026\u003c/li\u003e \u003cli\u003eQRadar App SDK versions 2.2.x ant\u00e9rieures \u00e0 2.2.1\u003c/li\u003e \u003cli\u003eQRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.13\u003c/li\u003e \u003cli\u003eCloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.20.0\u003c/li\u003e \u003cli\u003eQRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP8 IF01\u003c/li\u003e \u003cli\u003eQRadar Suite Software versions 1.10.12.x ant\u00e9rieures \u00e0 1.10.20.0\u003c/li\u003e \u003cli\u003eWebSphere Application Server Liberty versions post\u00e9rieures \u00e0 21.0.0.2 et ant\u00e9rieures \u00e0 24.0.0.4\u003c/li\u003e \u003cli\u003eWebSphere Application Server versions 9.x ant\u00e9rieures \u00e0 9.0.5.19\u003c/li\u003e \u003cli\u003eWebSphere Application Server versions post\u00e9rieures \u00e0 8.5.5.2 ant\u00e9rieures \u00e0 8.5.5.26\u003c/li\u003e \u003cli\u003eSterling B2B Integrator versions 6.0.x.x \u00e0 6.1.x.x ant\u00e9rieures \u00e0 6.1.2.5\u003c/li\u003e \u003cli\u003eSterling B2B Integrator versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.1\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer aux bulletin de l\u0027\u00e9diteur pour les versions des fichiers vuln\u00e9rables (cf. section Documentation).\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2024-1597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2012-0881",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0881"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-22696",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6135"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2020-28241",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28241"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2022-46363",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46363"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2021-41043",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-30468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30468"
},
{
"name": "CVE-2024-26130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2023-42794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42794"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3094"
},
{
"name": "CVE-2022-41721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41721"
},
{
"name": "CVE-2022-42920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42920"
},
{
"name": "CVE-2022-23437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23437"
},
{
"name": "CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2011-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4969"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2022-46329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
},
{
"name": "CVE-2023-34966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34966"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2015-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9251"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2012-6708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6708"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2024-22234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22234"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0305",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147813 du 09 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147813"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148062 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148062"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147943 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147943"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147903 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147903"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148094 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148094"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148151 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148151"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148066 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148066"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148158 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148158"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147727 du 08 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147727"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148065 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148065"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148068 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148068"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147728 du 08 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147728"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147944 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147944"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147726 du 08 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147726"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147923 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147923"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147812 du 09 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147812"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148063 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148063"
}
]
}
CERTFR-2024-AVI-0535
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2308.x antérieures à 9.1.2308.209 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.10 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.2 | ||
| Splunk | Universal Forwarder | Universal Forwarder sur Solaris versions 9.0.x antérieures à 9.0.10 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.5 | ||
| Splunk | Universal Forwarder | Universal Forwarder sur Solaris versions 9.2.x antérieures à 9.2.2 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.202 | ||
| Splunk | Universal Forwarder | Universal Forwarder sur Solaris versions 9.1.x antérieures à 9.1.5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Cloud Platform versions 9.1.2308.x ant\u00e9rieures \u00e0 9.1.2308.209",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.10",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.2",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder sur Solaris versions 9.0.x ant\u00e9rieures \u00e0 9.0.10",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder sur Solaris versions 9.2.x ant\u00e9rieures \u00e0 9.2.2",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.202",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder sur Solaris versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
},
{
"name": "CVE-2024-36996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36996"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-36985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36985"
},
{
"name": "CVE-2022-36364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
},
{
"name": "CVE-2024-36989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36989"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2024-36991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36991"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2024-36983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36983"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2024-36992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36992"
},
{
"name": "CVE-2024-36995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36995"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2024-36993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36993"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2024-36984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36984"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-36994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36994"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-36987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36987"
},
{
"name": "CVE-2022-40896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40896"
},
{
"name": "CVE-2024-36986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36986"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-36997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36997"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-36990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36990"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0535",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0711",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0711"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0718",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0718"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0716",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0716"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0709",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0709"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0707",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0707"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0704",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0704"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0710",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0710"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0717",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0717"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0705",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0705"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0715",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0715"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0712",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0712"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0714",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0714"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0703",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0703"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0708",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0708"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0713",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0713"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0706",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0706"
}
]
}
CERTFR-2025-AVI-0585
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Valkey versions ant\u00e9rieures \u00e0 8.1.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": " Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.30.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2022-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2817"
},
{
"name": "CVE-2022-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2182"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-4504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4504"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2024-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7531"
},
{
"name": "CVE-2021-25317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25317"
},
{
"name": "CVE-2021-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3968"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2022-2344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2344"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2022-3016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3016"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2022-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2285"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2022-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2982"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2022-2287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2287"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2946"
},
{
"name": "CVE-2022-2862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2862"
},
{
"name": "CVE-2022-2889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2889"
},
{
"name": "CVE-2021-4173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4173"
},
{
"name": "CVE-2020-12413",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12413"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2023-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0051"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2023-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4781"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2022-3324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3324"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-2257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2257"
},
{
"name": "CVE-2024-45306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45306"
},
{
"name": "CVE-2023-4751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4751"
},
{
"name": "CVE-2021-4136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4136"
},
{
"name": "CVE-2023-4738",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4738"
},
{
"name": "CVE-2021-3928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3928"
},
{
"name": "CVE-2015-1197",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1197"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2022-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2042"
},
{
"name": "CVE-2022-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2183"
},
{
"name": "CVE-2024-29040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29040"
},
{
"name": "CVE-2017-1000383",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000383"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2304"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2022-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2819"
},
{
"name": "CVE-2022-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3705"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3234"
},
{
"name": "CVE-2022-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2126"
},
{
"name": "CVE-2021-3973",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3973"
},
{
"name": "CVE-2021-4166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4166"
},
{
"name": "CVE-2022-3256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3256"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2022-2343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2343"
},
{
"name": "CVE-2022-2849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2849"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3235"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2022-3134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3134"
},
{
"name": "CVE-2023-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0512"
},
{
"name": "CVE-2022-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2175"
},
{
"name": "CVE-2022-3297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3297"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1616"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2022-2284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2284"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2022-2286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2286"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2022-3352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3352"
},
{
"name": "CVE-2023-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0054"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2022-3296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3296"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2022-42889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42889"
},
{
"name": "CVE-2023-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0433"
},
{
"name": "CVE-2022-2345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2345"
},
{
"name": "CVE-2021-3974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3974"
},
{
"name": "CVE-2022-2845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2845"
},
{
"name": "CVE-2022-2210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2210"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-4735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4735"
},
{
"name": "CVE-2023-4734",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4734"
},
{
"name": "CVE-2023-2610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2610"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2022-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1620"
},
{
"name": "CVE-2023-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5535"
},
{
"name": "CVE-2022-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1720"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2022-4292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4292"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2022-2522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2522"
},
{
"name": "CVE-2022-2129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2129"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-27151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27151"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2023-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0288"
},
{
"name": "CVE-2025-52968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52968"
},
{
"name": "CVE-2022-3037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3037"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-2206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2206"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2124"
},
{
"name": "CVE-2023-7207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7207"
},
{
"name": "CVE-2022-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1619"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2022-4141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4141"
},
{
"name": "CVE-2022-3099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3099"
},
{
"name": "CVE-2021-4187",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4187"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2021-3927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3927"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2023-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0049"
},
{
"name": "CVE-2023-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5344"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2022-2125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2125"
},
{
"name": "CVE-2022-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2207"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-1127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1127"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0585",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35935",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35935"
},
{
"published_at": "2025-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35934",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35934"
},
{
"published_at": "2025-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35931",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35931"
}
]
}
CERTFR-2025-AVI-0135
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM QRadar Deployment Intelligence App. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | QRadar Deployment Intelligence App versions antérieures à 3.0.16 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.16",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-42459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2021-33503",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
},
{
"name": "CVE-2018-18074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18074"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2020-25659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-36242",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2024-42461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0135",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar Deployment Intelligence App. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar Deployment Intelligence App",
"vendor_advisories": [
{
"published_at": "2025-02-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182930",
"url": "https://www.ibm.com/support/pages/node/7182930"
}
]
}
CERTFR-2025-AVI-0279
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | Db2 versions antérieures à 5.1.2 pour Cloud Pak for Data | ||
| IBM | WebSphere | WebSphere Application Server Liberty sans le correctif APAR PH65394 | ||
| IBM | Db2 Warehouse | Db2 Warehouse versions antérieures à 5.1.2 pour Cloud Pak for Data | ||
| IBM | WebSphere | WebSphere Hybrid Edition sans le dernier correctif de sécurité | ||
| IBM | QRadar Analyst Workflow | QRadar Analyst Workflow versions antérieures à 3.0.0 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Db2 versions ant\u00e9rieures \u00e0 5.1.2 pour Cloud Pak for Data",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server Liberty sans le correctif APAR PH65394",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse versions ant\u00e9rieures \u00e0 5.1.2 pour Cloud Pak for Data",
"product": {
"name": "Db2 Warehouse",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Analyst Workflow versions ant\u00e9rieures \u00e0 3.0.0",
"product": {
"name": "QRadar Analyst Workflow",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-37071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37071"
},
{
"name": "CVE-2025-25285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25285"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-34997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34997"
},
{
"name": "CVE-2024-51479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51479"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-41761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41761"
},
{
"name": "CVE-2022-29153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29153"
},
{
"name": "CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2018-6341",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6341"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2025-25288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25288"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2025-25290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25290"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-6484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6484"
},
{
"name": "CVE-2020-13844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13844"
},
{
"name": "CVE-2024-26776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26776"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2024-41762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41762"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2025-23184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23184"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2021-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4204"
},
{
"name": "CVE-2024-26843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26843"
},
{
"name": "CVE-2024-40679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40679"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2018-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
},
{
"name": "CVE-2019-11253",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11253"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2025-25289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25289"
},
{
"name": "CVE-2024-45663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45663"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2024-36620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36620"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0279",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-04-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7230024",
"url": "https://www.ibm.com/support/pages/node/7230024"
},
{
"published_at": "2025-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229770",
"url": "https://www.ibm.com/support/pages/node/7229770"
},
{
"published_at": "2025-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229443",
"url": "https://www.ibm.com/support/pages/node/7229443"
},
{
"published_at": "2025-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229768",
"url": "https://www.ibm.com/support/pages/node/7229768"
},
{
"published_at": "2025-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229772",
"url": "https://www.ibm.com/support/pages/node/7229772"
}
]
}
CERTFR-2024-AVI-0086
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Secure Analytics - Log Collector versions antérieures à v1.8.4 | ||
| Juniper Networks | Secure Analytics | Secure Analytics - Deployment Intelligence App versions antérieures à 3.0.12 | ||
| Juniper Networks | Secure Analytics | Secure Analytics versions antérieures à 7.5.0 UP7 | ||
| Juniper Networks | Secure Analytics | Secure Analytics - User Behavior Analytics Application add-on versions antérieures à 4.1.14 | ||
| Juniper Networks | Secure Analytics | Secure Analytics - SOAR Plugin App versions antérieures à 5.3.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Secure Analytics - Log Collector versions ant\u00e9rieures \u00e0 v1.8.4",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Secure Analytics - Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.12",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP7",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Secure Analytics - User Behavior Analytics Application add-on versions ant\u00e9rieures \u00e0 4.1.14",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Secure Analytics - SOAR Plugin App versions ant\u00e9rieures \u00e0 5.3.1",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38020"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2023-46136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-21611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21611"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38019"
},
{
"name": "CVE-2023-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38263"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0086",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA76715 du 1 f\u00e9vrier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-7-5-0-UP7-IF04?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA76718 du 1 f\u00e9vrier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications?language=en_US"
}
]
}
CERTFR-2024-AVI-0385
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.2.x antérieures à 6.2.0.23 | ||
| IBM | N/A | AIX et VIOS sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions antérieures à 6.1.0.24 | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.4.0 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.7 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP8 IF02 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX et VIOS sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions ant\u00e9rieures \u00e0 6.1.0.24",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.7",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP8 IF02",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
},
{
"name": "CVE-2023-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4732"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2023-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2024-27273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27273"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-51043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51043"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-45688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45688"
},
{
"name": "CVE-2022-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-10001",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10001"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2021-33503",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2022-45884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45884"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-33951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33951"
},
{
"name": "CVE-2024-28102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28102"
},
{
"name": "CVE-2023-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2163"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-45862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45862"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2020-3898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3898"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2023-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-31084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
},
{
"name": "CVE-2023-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2023-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2023-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
},
{
"name": "CVE-2023-33203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
},
{
"name": "CVE-2023-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3812"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-27269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27269"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2018-19787",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19787"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1252"
},
{
"name": "CVE-2023-44794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44794"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-33952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33952"
},
{
"name": "CVE-2023-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32324"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2014-3146",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3146"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-3161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3161"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2023-45871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-28772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28772"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2023-1075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-45887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2024-26130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2023-34241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34241"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2023-4622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4622"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2023-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2021-33631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2023-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0597"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-7192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2023-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2021-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2166"
},
{
"name": "CVE-2023-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1192"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0385",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150297 du 06 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150297"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150684 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150684"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150803 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150803"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150277 du 05 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150277"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150196 du 03 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150196"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150798 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150798"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150804 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150799 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150799"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150276 du 05 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150276"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150802 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150802"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150362 du 07 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150362"
}
]
}
CERTFR-2024-AVI-0506
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Secure Analytics versions antérieures à 7.5.0 UP8 IF03 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP8 IF03",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
},
{
"name": "CVE-2023-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4732"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2019-15505",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15505"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2023-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-40551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40551"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-51043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51043"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-45863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45863"
},
{
"name": "CVE-2022-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
},
{
"name": "CVE-2023-6915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6915"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-37453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37453"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2020-10001",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10001"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2022-45884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45884"
},
{
"name": "CVE-2023-52489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52489"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-33951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33951"
},
{
"name": "CVE-2023-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2163"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2023-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4244"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2023-39193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39193"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2024-22243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22243"
},
{
"name": "CVE-2023-45862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45862"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2020-3898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3898"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2024-28784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28784"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2023-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-50961",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50961"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-31084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
},
{
"name": "CVE-2024-26609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26609"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2023-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
},
{
"name": "CVE-2001-1267",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1267"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2023-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
},
{
"name": "CVE-2024-22262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22262"
},
{
"name": "CVE-2023-33203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3812"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39189"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-27269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27269"
},
{
"name": "CVE-2023-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38409"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2018-19787",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6135"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2023-39198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39198"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2023-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1252"
},
{
"name": "CVE-2021-3753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2020-28241",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28241"
},
{
"name": "CVE-2023-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-33952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33952"
},
{
"name": "CVE-2023-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32324"
},
{
"name": "CVE-2014-3146",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3146"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-3758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3758"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-40546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40546"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-3161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3161"
},
{
"name": "CVE-2023-28464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28464"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2023-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3567"
},
{
"name": "CVE-2021-41043",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2023-45871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-28772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28772"
},
{
"name": "CVE-2023-52580",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52580"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2023-1075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2023-52574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52574"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2023-31083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31083"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2023-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6176"
},
{
"name": "CVE-2022-45887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2023-25012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25012"
},
{
"name": "CVE-2022-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0500"
},
{
"name": "CVE-2024-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-25656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2023-51780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2023-34241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34241"
},
{
"name": "CVE-2022-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3094"
},
{
"name": "CVE-2024-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25742"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2023-4622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4622"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2021-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4204"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"name": "CVE-2023-39192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39192"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2023-39194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39194"
},
{
"name": "CVE-2023-52620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52620"
},
{
"name": "CVE-2023-24023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24023"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2023-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2021-33631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2023-40549",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40549"
},
{
"name": "CVE-2023-1513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1513"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2011-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4969"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2023-40548",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40548"
},
{
"name": "CVE-2023-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0597"
},
{
"name": "CVE-2024-22259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22259"
},
{
"name": "CVE-2022-46329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
},
{
"name": "CVE-2023-34966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34966"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-7192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2022-26377",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26377"
},
{
"name": "CVE-2023-52581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52581"
},
{
"name": "CVE-2023-40550",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40550"
},
{
"name": "CVE-2019-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13631"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2023-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-42755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42755"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2023-50960",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50960"
},
{
"name": "CVE-2015-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9251"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-25775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25775"
},
{
"name": "CVE-2012-6708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6708"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2023-6622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6622"
},
{
"name": "CVE-2021-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
},
{
"name": "CVE-2022-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23222"
},
{
"name": "CVE-2023-6121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2166"
},
{
"name": "CVE-2023-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1192"
},
{
"name": "CVE-2023-40547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40547"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-42754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42754"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0506",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Secure Analytics",
"vendor_advisories": [
{
"published_at": "2024-06-19",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82681",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP8-IF03"
}
]
}
CERTFR-2025-AVI-0303
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk SDK for JavaScript | Splunk SDK for JavaScript versions antérieures à 2.0.1 | ||
| Splunk | Splunk Connect for Syslog | Splunk Connect for Syslog versions antérieures à 3.34.3 | ||
| Splunk | N/A | Splunk sans les derniers correctifs de sécurité |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk SDK for JavaScript versions ant\u00e9rieures \u00e0 2.0.1",
"product": {
"name": "Splunk SDK for JavaScript",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Connect for Syslog versions ant\u00e9rieures \u00e0 3.34.3",
"product": {
"name": "Splunk Connect for Syslog",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2024-53899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53899"
},
{
"name": "CVE-2024-52804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52804"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0303",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0408",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0408"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0417",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0417"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0404",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0404"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0413",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0413"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0407",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0407"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0415",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0415"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0409",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0409"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0406",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0406"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0414",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0414"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0403",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0403"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0411",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0411"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0410",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0410"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0416",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0416"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0412",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0412"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0405",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0405"
}
]
}
CERTFR-2024-AVI-0506
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Secure Analytics versions antérieures à 7.5.0 UP8 IF03 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP8 IF03",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
},
{
"name": "CVE-2023-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4732"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2019-15505",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15505"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2023-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-40551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40551"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-51043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51043"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-45863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45863"
},
{
"name": "CVE-2022-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
},
{
"name": "CVE-2023-6915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6915"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-37453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37453"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2020-10001",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10001"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2022-45884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45884"
},
{
"name": "CVE-2023-52489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52489"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-33951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33951"
},
{
"name": "CVE-2023-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2163"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2023-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4244"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2023-39193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39193"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2024-22243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22243"
},
{
"name": "CVE-2023-45862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45862"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2020-3898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3898"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2024-28784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28784"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2023-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-50961",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50961"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-31084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
},
{
"name": "CVE-2024-26609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26609"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2023-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
},
{
"name": "CVE-2001-1267",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1267"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2023-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
},
{
"name": "CVE-2024-22262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22262"
},
{
"name": "CVE-2023-33203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3812"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39189"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-27269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27269"
},
{
"name": "CVE-2023-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38409"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2018-19787",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6135"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2023-39198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39198"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2023-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1252"
},
{
"name": "CVE-2021-3753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2020-28241",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28241"
},
{
"name": "CVE-2023-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-33952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33952"
},
{
"name": "CVE-2023-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32324"
},
{
"name": "CVE-2014-3146",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3146"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-3758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3758"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-40546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40546"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-3161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3161"
},
{
"name": "CVE-2023-28464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28464"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2023-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3567"
},
{
"name": "CVE-2021-41043",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2023-45871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-28772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28772"
},
{
"name": "CVE-2023-52580",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52580"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2023-1075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2023-52574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52574"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2023-31083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31083"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2023-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6176"
},
{
"name": "CVE-2022-45887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2023-25012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25012"
},
{
"name": "CVE-2022-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0500"
},
{
"name": "CVE-2024-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-25656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2023-51780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2023-34241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34241"
},
{
"name": "CVE-2022-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3094"
},
{
"name": "CVE-2024-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25742"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2023-4622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4622"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2021-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4204"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"name": "CVE-2023-39192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39192"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2023-39194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39194"
},
{
"name": "CVE-2023-52620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52620"
},
{
"name": "CVE-2023-24023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24023"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2023-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2021-33631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2023-40549",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40549"
},
{
"name": "CVE-2023-1513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1513"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2011-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4969"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2023-40548",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40548"
},
{
"name": "CVE-2023-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0597"
},
{
"name": "CVE-2024-22259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22259"
},
{
"name": "CVE-2022-46329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
},
{
"name": "CVE-2023-34966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34966"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-7192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2022-26377",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26377"
},
{
"name": "CVE-2023-52581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52581"
},
{
"name": "CVE-2023-40550",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40550"
},
{
"name": "CVE-2019-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13631"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2023-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-42755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42755"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2023-50960",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50960"
},
{
"name": "CVE-2015-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9251"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-25775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25775"
},
{
"name": "CVE-2012-6708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6708"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2023-6622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6622"
},
{
"name": "CVE-2021-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
},
{
"name": "CVE-2022-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23222"
},
{
"name": "CVE-2023-6121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2166"
},
{
"name": "CVE-2023-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1192"
},
{
"name": "CVE-2023-40547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40547"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-42754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42754"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0506",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Secure Analytics",
"vendor_advisories": [
{
"published_at": "2024-06-19",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82681",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP8-IF03"
}
]
}
CERTFR-2025-AVI-0135
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM QRadar Deployment Intelligence App. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | QRadar Deployment Intelligence App versions antérieures à 3.0.16 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.16",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-42459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2021-33503",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
},
{
"name": "CVE-2018-18074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18074"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2020-25659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-36242",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2024-42461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0135",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar Deployment Intelligence App. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar Deployment Intelligence App",
"vendor_advisories": [
{
"published_at": "2025-02-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182930",
"url": "https://www.ibm.com/support/pages/node/7182930"
}
]
}
CERTFR-2025-AVI-0585
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Valkey versions ant\u00e9rieures \u00e0 8.1.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": " Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.30.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2022-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2817"
},
{
"name": "CVE-2022-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2182"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-4504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4504"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2024-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7531"
},
{
"name": "CVE-2021-25317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25317"
},
{
"name": "CVE-2021-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3968"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2022-2344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2344"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2022-3016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3016"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2022-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2285"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2022-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2982"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2022-2287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2287"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2946"
},
{
"name": "CVE-2022-2862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2862"
},
{
"name": "CVE-2022-2889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2889"
},
{
"name": "CVE-2021-4173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4173"
},
{
"name": "CVE-2020-12413",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12413"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2023-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0051"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2023-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4781"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2022-3324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3324"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-2257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2257"
},
{
"name": "CVE-2024-45306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45306"
},
{
"name": "CVE-2023-4751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4751"
},
{
"name": "CVE-2021-4136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4136"
},
{
"name": "CVE-2023-4738",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4738"
},
{
"name": "CVE-2021-3928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3928"
},
{
"name": "CVE-2015-1197",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1197"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2022-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2042"
},
{
"name": "CVE-2022-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2183"
},
{
"name": "CVE-2024-29040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29040"
},
{
"name": "CVE-2017-1000383",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000383"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2304"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2022-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2819"
},
{
"name": "CVE-2022-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3705"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3234"
},
{
"name": "CVE-2022-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2126"
},
{
"name": "CVE-2021-3973",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3973"
},
{
"name": "CVE-2021-4166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4166"
},
{
"name": "CVE-2022-3256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3256"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2022-2343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2343"
},
{
"name": "CVE-2022-2849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2849"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3235"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2022-3134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3134"
},
{
"name": "CVE-2023-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0512"
},
{
"name": "CVE-2022-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2175"
},
{
"name": "CVE-2022-3297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3297"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1616"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2022-2284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2284"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2022-2286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2286"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2022-3352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3352"
},
{
"name": "CVE-2023-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0054"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2022-3296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3296"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2022-42889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42889"
},
{
"name": "CVE-2023-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0433"
},
{
"name": "CVE-2022-2345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2345"
},
{
"name": "CVE-2021-3974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3974"
},
{
"name": "CVE-2022-2845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2845"
},
{
"name": "CVE-2022-2210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2210"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-4735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4735"
},
{
"name": "CVE-2023-4734",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4734"
},
{
"name": "CVE-2023-2610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2610"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2022-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1620"
},
{
"name": "CVE-2023-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5535"
},
{
"name": "CVE-2022-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1720"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2022-4292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4292"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2022-2522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2522"
},
{
"name": "CVE-2022-2129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2129"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-27151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27151"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2023-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0288"
},
{
"name": "CVE-2025-52968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52968"
},
{
"name": "CVE-2022-3037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3037"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-2206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2206"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2124"
},
{
"name": "CVE-2023-7207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7207"
},
{
"name": "CVE-2022-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1619"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2022-4141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4141"
},
{
"name": "CVE-2022-3099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3099"
},
{
"name": "CVE-2021-4187",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4187"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2021-3927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3927"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2023-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0049"
},
{
"name": "CVE-2023-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5344"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2022-2125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2125"
},
{
"name": "CVE-2022-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2207"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-1127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1127"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0585",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35935",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35935"
},
{
"published_at": "2025-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35934",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35934"
},
{
"published_at": "2025-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35931",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35931"
}
]
}
CERTFR-2024-AVI-0297
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Cloud Native Router versions antérieures à 23.4
- cRPD versions antérieures à 23.4R1
- Paragon Active Assurance versions antérieures à 4.2.1
- Paragon Active Assurance versions antérieures à 4.3.0
- Junos OS gamme EX4300 versions antérieures à 20.4R3-S10, 21.2R3-S7 et 21.4R3-S6
- Junos OS gammes QFX5000 Series, EX4400 Series, EX4100 Series et EX4650 Series versions antérieures à 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1
- Junos OS gammes SRX Branch Series versions antérieures à 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2 et 23.2R1
- Junos OS gammes MX Series avec SPC3 et MS-MPC versions antérieures à 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1
- Junos OS gamme SRX 5000 Series avec SPC2 versions antérieures à 21.2R3-S7, 21.4, 22.1, 22.2, 22.3, 22.4 et 23.2
- Junos OS gammes MX Series versions antérieures à 20.4R3-S5, 21.1, 21.2R3-S1, 21.3, 21.4R3, 22.1R2, 22.2R2 et 22.3
- Junos OS gamme EX9200-15C versions antérieures à 21.2R3-S1, 21.4R3, 22.1R2 et 22.2R2
- Junos OS gammes SRX4600 versions antérieures à 21.2R3-S7, 21.4R3-S6, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R1-S2, 23.2R2 et 23.4R1
- Junos OS gammes ACX5448 et ACX710 versions antérieures à 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2 et 23.2R1
- Junos OS versions antérieures à 20.4R3-S9, 21.1R3, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S2, 22.4R3 et 23.4R2
-
Junos OS Evolved versions antérieures à 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO et 23.4R1-EVO
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eCloud Native Router versions ant\u00e9rieures \u00e0 23.4\u003c/li\u003e \u003cli\u003ecRPD versions ant\u00e9rieures \u00e0 23.4R1\u003c/li\u003e \u003cli\u003eParagon Active Assurance versions ant\u00e9rieures \u00e0 4.2.1\u003c/li\u003e \u003cli\u003eParagon Active Assurance versions ant\u00e9rieures \u00e0 4.3.0\u003c/li\u003e \u003cli\u003eJunos OS gamme EX4300 versions ant\u00e9rieures \u00e0 20.4R3-S10, 21.2R3-S7 et 21.4R3-S6\u003c/li\u003e \u003cli\u003eJunos OS gammes QFX5000 Series, EX4400 Series, EX4100 Series et EX4650 Series versions ant\u00e9rieures \u00e0 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gammes SRX Branch Series versions ant\u00e9rieures \u00e0 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gammes MX Series avec SPC3 et MS-MPC versions ant\u00e9rieures \u00e0 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gamme SRX 5000 Series avec SPC2 versions ant\u00e9rieures \u00e0 21.2R3-S7, 21.4, 22.1, 22.2, 22.3, 22.4 et 23.2\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0MX Series versions ant\u00e9rieures \u00e0 20.4R3-S5, 21.1, 21.2R3-S1, 21.3, 21.4R3, 22.1R2, 22.2R2 et 22.3\u003c/li\u003e \u003cli\u003eJunos OS gamme EX9200-15C versions ant\u00e9rieures \u00e0 21.2R3-S1, 21.4R3, 22.1R2 et 22.2R2\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0SRX4600 versions ant\u00e9rieures \u00e0 21.2R3-S7,\u00a021.4R3-S6,\u00a022.1R3-S5,\u00a022.2R3-S3,\u00a022.3R3-S2,\u00a022.4R3,\u00a023.2R1-S2, 23.2R2 et 23.4R1\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0ACX5448 et ACX710 versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.1R3, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S2, 22.4R3 et 23.4R2\u003c/li\u003e \u003cli\u003e \u003cdiv\u003e \u003cdiv\u003e \u003cp\u003eJunos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO et 23.4R1-EVO\u003c/p\u003e \u003c/div\u003e \u003c/div\u003e \u003c/li\u003e \u003c/ul\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2024-30381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30381"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2020-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1747"
},
{
"name": "CVE-2024-30401",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30401"
},
{
"name": "CVE-2021-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28831"
},
{
"name": "CVE-2024-30409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30409"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2020-14343",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2023-39975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39975"
},
{
"name": "CVE-2024-30410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30410"
},
{
"name": "CVE-2018-7738",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-28957",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28957"
},
{
"name": "CVE-2024-30380",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30380"
},
{
"name": "CVE-2023-41913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41913"
},
{
"name": "CVE-2024-30392",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30392"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23240"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2011-1676",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1676"
},
{
"name": "CVE-2020-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8037"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2020-19190",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19190"
},
{
"name": "CVE-2024-30391",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30391"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-30389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30389"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-3592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3592"
},
{
"name": "CVE-2020-19187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19187"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2019-9923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9923"
},
{
"name": "CVE-2021-39534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39534"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30398"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2020-19188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19188"
},
{
"name": "CVE-2020-19186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19186"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-25659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
},
{
"name": "CVE-2021-39531",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39531"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2011-1675",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1675"
},
{
"name": "CVE-2023-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28366"
},
{
"name": "CVE-2024-30378",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30378"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2021-34434",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34434"
},
{
"name": "CVE-2016-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10009"
},
{
"name": "CVE-2023-1428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1428"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-30402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30402"
},
{
"name": "CVE-2018-1000215",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000215"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2024-30403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30403"
},
{
"name": "CVE-2021-36159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36159"
},
{
"name": "CVE-2018-1000654",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000654"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2021-30139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30139"
},
{
"name": "CVE-2024-30384",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30384"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2024-30387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30387"
},
{
"name": "CVE-2017-18018",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18018"
},
{
"name": "CVE-2024-30406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30406"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2024-30394",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30394"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-30407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30407"
},
{
"name": "CVE-2020-36242",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
},
{
"name": "CVE-2023-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4785"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2020-27350",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27350"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2021-39533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39533"
},
{
"name": "CVE-2024-30390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30390"
},
{
"name": "CVE-2020-19185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19185"
},
{
"name": "CVE-2023-0809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0809"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2020-19189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2024-30388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30388"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2024-30386",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30386"
},
{
"name": "CVE-2021-33560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33560"
},
{
"name": "CVE-2011-1677",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1677"
},
{
"name": "CVE-2018-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
},
{
"name": "CVE-2020-28928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28928"
},
{
"name": "CVE-2021-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41039"
},
{
"name": "CVE-2024-30382",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30382"
},
{
"name": "CVE-2018-20482",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20482"
},
{
"name": "CVE-2021-40528",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40528"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2020-28493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28493"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2011-1089",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1089"
},
{
"name": "CVE-2024-30405",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30405"
},
{
"name": "CVE-2024-30397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30397"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2024-30395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30395"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0297",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79102 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-libslax-Multiple-vulnerabilities-in-libslax-resolved?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79106 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Juniper-Cloud-Native-Router-Multiple-vulnerabilities-resolved-in-23-4-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79181 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-When-MAC-learning-happens-and-an-interface-gets-flapped-the-PFE-crashes-CVE-2024-30403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79186 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-If-a-specific-CLI-command-is-issued-PFE-crashes-will-occur-CVE-2024-30384?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79089 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX-Series-Specific-malformed-LACP-packets-will-cause-flaps-CVE-2024-30388?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79173 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Paragon-Active-Assurance-probe-serviced-exposes-internal-objects-to-local-users-CVE-2024-30381?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79104 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-ACX-Series-with-Paragon-Active-Assurance-Test-Agent-A-local-high-privileged-attacker-can-recover-other-administrators-credentials-CVE-2024-30406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79094 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-A-specific-EVPN-type-5-route-causes-rpd-crash-CVE-2024-30394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79183 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-Connection-limits-is-not-being-enforced-while-the-resp-rate-limit-is-being-enforced-CVE-2024-30390?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79176 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX4600-Series-A-high-amount-of-specific-traffic-causes-packet-drops-and-an-eventual-PFE-crash-CVE-2024-30398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79179 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-An-invalid-certificate-causes-a-Denial-of-Service-in-the-Internet-Key-Exchange-IKE-process-CVE-2024-30397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79187 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-ACX5448-ACX710-Due-to-the-interface-flaps-the-PFE-process-can-crash-CVE-2024-30387?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79109 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-bbe-smgd-process-crash-upon-execution-of-specific-CLI-commands-CVE-2024-30378?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79171 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-l2cpd-crash-upon-receipt-of-a-specific-TLV-CVE-2024-30380?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79188 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-SRX-Series-When-IPsec-authentication-is-configured-with-hmac-sha-384-and-hmac-sha-512-no-authentication-of-traffic-is-performed-CVE-2024-30391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79099 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Higher-CPU-consumption-on-routing-engine-leads-to-Denial-of-Service-DoS-CVE-2024-30409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79184 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-EVPN-VXLAN-scenario-state-changes-on-adjacent-systems-can-cause-an-l2ald-process-crash-CVE-2024-30386?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79110 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-15C-Stack-based-buffer-overflow-in-aftman-CVE-2024-30401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79174 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-RPD-crash-when-CoS-based-forwarding-CBF-policy-is-configured-CVE-2024-30382?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79095 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-malformed-BGP-tunnel-encapsulation-attribute-will-lead-to-an-rpd-crash-CVE-2024-30395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79100 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-Loopback-filter-not-blocking-traffic-despite-having-discard-term-CVE-2024-30410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79107 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-cRPD-Multiple-vulnerabilities-resolved-in-23-4R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79092 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-MS-MPC-MIC-When-URL-filtering-is-enabled-and-a-specific-URL-request-is-received-a-flowd-crash-occurs-CVE-2024-30392?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79185 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-Firewall-filter-not-blocking-egress-traffic-CVE-2024-30389?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79108 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-cURL-vulnerabilities-resolved?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79091 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX-Branch-Series-When-DNS-proxy-is-configured-and-specific-DNS-queries-are-received-resolver-s-performance-is-degraded-CVE-2022-2795?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79180 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-l2ald-crashes-on-receiving-telemetry-messages-from-a-specific-subscription-CVE-2024-30402?language=en_US"
}
]
}
CERTFR-2024-AVI-0305
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Sterling Connect:Direct pour UNIX versions 6.1.0.x antérieures à 6.1.0.4.iFix104
- Sterling Connect:Direct pour UNIX versions 6.0.0.x antérieures à 6.0.0.2.iFix163
- Sterling Connect:Direct FTP+ versions antérieures à 1.3.0 sans le correctif de sécurité iFix026
- QRadar App SDK versions 2.2.x antérieures à 2.2.1
- QRadar Deployment Intelligence App versions antérieures à 3.0.13
- Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.20.0
- QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP8 IF01
- QRadar Suite Software versions 1.10.12.x antérieures à 1.10.20.0
- WebSphere Application Server Liberty versions postérieures à 21.0.0.2 et antérieures à 24.0.0.4
- WebSphere Application Server versions 9.x antérieures à 9.0.5.19
- WebSphere Application Server versions postérieures à 8.5.5.2 antérieures à 8.5.5.26
- Sterling B2B Integrator versions 6.0.x.x à 6.1.x.x antérieures à 6.1.2.5
- Sterling B2B Integrator versions 6.2.x.x antérieures à 6.2.0.1
Se référer aux bulletin de l'éditeur pour les versions des fichiers vulnérables (cf. section Documentation).
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eSterling Connect:Direct pour UNIX versions 6.1.0.x ant\u00e9rieures \u00e0\u00a06.1.0.4.iFix104\u003c/li\u003e \u003cli\u003eSterling Connect:Direct pour UNIX versions 6.0.0.x ant\u00e9rieures \u00e0 6.0.0.2.iFix163\u003c/li\u003e \u003cli\u003eSterling Connect:Direct FTP+ versions ant\u00e9rieures \u00e0 1.3.0 sans le correctif de s\u00e9curit\u00e9 iFix026\u003c/li\u003e \u003cli\u003eQRadar App SDK versions 2.2.x ant\u00e9rieures \u00e0 2.2.1\u003c/li\u003e \u003cli\u003eQRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.13\u003c/li\u003e \u003cli\u003eCloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.20.0\u003c/li\u003e \u003cli\u003eQRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP8 IF01\u003c/li\u003e \u003cli\u003eQRadar Suite Software versions 1.10.12.x ant\u00e9rieures \u00e0 1.10.20.0\u003c/li\u003e \u003cli\u003eWebSphere Application Server Liberty versions post\u00e9rieures \u00e0 21.0.0.2 et ant\u00e9rieures \u00e0 24.0.0.4\u003c/li\u003e \u003cli\u003eWebSphere Application Server versions 9.x ant\u00e9rieures \u00e0 9.0.5.19\u003c/li\u003e \u003cli\u003eWebSphere Application Server versions post\u00e9rieures \u00e0 8.5.5.2 ant\u00e9rieures \u00e0 8.5.5.26\u003c/li\u003e \u003cli\u003eSterling B2B Integrator versions 6.0.x.x \u00e0 6.1.x.x ant\u00e9rieures \u00e0 6.1.2.5\u003c/li\u003e \u003cli\u003eSterling B2B Integrator versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.1\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer aux bulletin de l\u0027\u00e9diteur pour les versions des fichiers vuln\u00e9rables (cf. section Documentation).\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2024-1597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2012-0881",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0881"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-22696",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6135"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2020-28241",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28241"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2022-46363",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46363"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2021-41043",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-30468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30468"
},
{
"name": "CVE-2024-26130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2023-42794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42794"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3094"
},
{
"name": "CVE-2022-41721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41721"
},
{
"name": "CVE-2022-42920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42920"
},
{
"name": "CVE-2022-23437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23437"
},
{
"name": "CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2011-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4969"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2022-46329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
},
{
"name": "CVE-2023-34966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34966"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2015-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9251"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2012-6708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6708"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2024-22234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22234"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0305",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147813 du 09 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147813"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148062 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148062"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147943 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147943"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147903 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147903"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148094 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148094"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148151 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148151"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148066 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148066"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148158 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148158"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147727 du 08 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147727"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148065 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148065"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148068 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148068"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147728 du 08 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147728"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147944 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147944"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147726 du 08 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147726"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147923 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147923"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147812 du 09 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147812"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148063 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148063"
}
]
}
CERTFR-2025-AVI-0627
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere | WebSphere Remote Server sans le dernier correctif de sécurité | ||
| IBM | QRadar | Security QRadar Network Threat Analytics versions antérieures à 1.4.0 | ||
| IBM | Db2 | DB2 Data Management Console versions antérieures à 5.1.2 sur CPD | ||
| IBM | Db2 Query Management Facility | DB2 Query Management Facility versions 13.1.x sans le dernier correctif de sécurité | ||
| IBM | Db2 | DB2 Data Management Console versions antérieures à 3.1.13.1 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere Remote Server sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar Network Threat Analytics versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console versions ant\u00e9rieures \u00e0 5.1.2 sur CPD",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Query Management Facility versions 13.1.x sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Db2 Query Management Facility",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console versions ant\u00e9rieures \u00e0 3.1.13.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-5629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5629"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2023-46298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46298"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2024-1135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1135"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3121"
},
{
"name": "CVE-2024-52046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52046"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2024-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6827"
},
{
"name": "CVE-2025-2900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2900"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2023-32305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32305"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0627",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-07-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240466",
"url": "https://www.ibm.com/support/pages/node/7240466"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240530",
"url": "https://www.ibm.com/support/pages/node/7240530"
},
{
"published_at": "2025-07-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240471",
"url": "https://www.ibm.com/support/pages/node/7240471"
},
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240267",
"url": "https://www.ibm.com/support/pages/node/7240267"
},
{
"published_at": "2025-07-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240474",
"url": "https://www.ibm.com/support/pages/node/7240474"
},
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240250",
"url": "https://www.ibm.com/support/pages/node/7240250"
}
]
}
CERTFR-2024-AVI-0074
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Unix versions 6.3.x.x antérieures à 6.3.0.2.iFix005 | ||
| IBM | QRadar Deployment Intelligence App | IBM QRadar Deployment Intelligence App versions antérieures à 3.0.12 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Unix versions 6.2.x.x antérieures à 6.2.0.7.iFix005 | ||
| IBM | QRadar | IBM SOAR QRadar Plugin App versions antérieures à 5.3.1 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Unix versions 6.0.x.x antérieures à 6.0.0.2.iFix159 | ||
| IBM | Storage Protect | IBM Storage Protect Plus vSnap versions 10.1.x antérieures à 10.1.15.3 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct pour Unix versions 6.1.x.x antérieures à 6.1.0.4.iFix099 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct pour Unix versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.2.iFix005",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.12",
"product": {
"name": "QRadar Deployment Intelligence App",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Unix versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.7.iFix005",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.3.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Unix versions 6.0.x.x ant\u00e9rieures \u00e0 6.0.0.2.iFix159",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Storage Protect Plus vSnap versions 10.1.x ant\u00e9rieures \u00e0 10.1.15.3",
"product": {
"name": "Storage Protect",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct pour Unix versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.4.iFix099",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-4004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38020"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2023-46136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2023-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38019"
},
{
"name": "CVE-2023-47148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47148"
},
{
"name": "CVE-2023-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38263"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111880 du 24 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7111880"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111720 du 22 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7111720"
}
],
"reference": "CERTFR-2024-AVI-0074",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111720 du 24 janvier 2024",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7096482 du 22 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7096482"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111880 du 25 janvier 2024",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7111679 du 24 janvier 2024",
"url": "https://www.ibm.com/support/pages/node/7111679"
}
]
}
CERTFR-2025-AVI-0481
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cloud Pak for Security versions 1.10.x ant\u00e9rieures \u00e0 1.11.3.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions post\u00e9rieures \u00e0 1.10.12.0 et ant\u00e9rieures \u00e0 1.11.3.0 ",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-32996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32996"
},
{
"name": "CVE-2019-11038",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11038"
},
{
"name": "CVE-2021-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38593"
},
{
"name": "CVE-2025-1334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1334"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-0793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0793"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2024-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-11831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
},
{
"name": "CVE-2025-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2023-52355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2025-32997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32997"
},
{
"name": "CVE-2024-9902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9902"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-56332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56332"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2024-38827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38827"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2025-25019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25019"
},
{
"name": "CVE-2020-35538",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35538"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2018-5711",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5711"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2025-25022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25022"
},
{
"name": "CVE-2025-25020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25020"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2025-25021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25021"
},
{
"name": "CVE-2024-52304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52304"
},
{
"name": "CVE-2023-24607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24607"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2024-57556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57556"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2023-24056",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-52317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52317"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0481",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-06T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-06-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7235432",
"url": "https://www.ibm.com/support/pages/node/7235432"
},
{
"published_at": "2025-06-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7235402",
"url": "https://www.ibm.com/support/pages/node/7235402"
}
]
}
CERTFR-2023-AVI-1055
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF03
- IBM Sterling B2B Integrator versions 6.0.0.x antérieures à 6.0.3.9
- IBM Sterling B2B Integrator versions 6.1.0.x antérieures à 6.1.0.8
- IBM Sterling B2B Integrator versions 6.1.1.x antérieures à 6.1.1.4
- IBM Sterling B2B Integrator versions 6.1.2.x antérieures à 6.1.2.3
- IBM Sterling B2B Integrator versions 6.1.2.x antérieures à 6.2.0.0
- IBM AIX version 7.3
- IBM AIX version 7.2
- IBM VIOS version 4.1
- IBM VIOS version 3.1
Se référer aux bulletin de l'éditeur pour les versions des fichiers vulnérables (cf. section Documentation).
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eIBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF03\u003c/li\u003e \u003cli\u003eIBM Sterling B2B Integrator versions 6.0.0.x ant\u00e9rieures \u00e0 6.0.3.9\u003c/li\u003e \u003cli\u003eIBM Sterling B2B Integrator versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.8\u003c/li\u003e \u003cli\u003eIBM Sterling B2B Integrator versions 6.1.1.x ant\u00e9rieures \u00e0 6.1.1.4\u003c/li\u003e \u003cli\u003eIBM Sterling B2B Integrator versions 6.1.2.x ant\u00e9rieures \u00e0 6.1.2.3\u003c/li\u003e \u003cli\u003eIBM Sterling B2B Integrator versions 6.1.2.x ant\u00e9rieures \u00e0 6.2.0.0\u003c/li\u003e \u003cli\u003eIBM AIX version 7.3\u003c/li\u003e \u003cli\u003eIBM AIX version 7.2\u003c/li\u003e \u003cli\u003eIBM VIOS version 4.1\u003c/li\u003e \u003cli\u003eIBM VIOS version 3.1\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer aux bulletin de l\u0027\u00e9diteur pour les versions des fichiers vuln\u00e9rables (cf. section Documentation).\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-1436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1436"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-34040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34040"
},
{
"name": "CVE-2022-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40149"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2022-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40150"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-40787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40787"
},
{
"name": "CVE-2022-45693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45693"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2022-45685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45685"
},
{
"name": "CVE-2023-41835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41835"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2023-41080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41080"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-47146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47146"
},
{
"name": "CVE-2023-32233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-1055",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-12-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance,\u00a0un d\u00e9ni de\nservice \u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7099297 du 18 d\u00e9cembre 2023",
"url": "https://www.ibm.com/support/pages/node/7099862"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7101062 du 21 d\u00e9cembre 2023",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7099862 du 19 d\u00e9cembre 2023",
"url": "https://www.ibm.com/support/pages/node/7101062"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7099313 du 18 d\u00e9cembre 2023",
"url": "https://www.ibm.com/support/pages/node/7099313"
}
]
}
CERTFR-2024-AVI-0297
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Cloud Native Router versions antérieures à 23.4
- cRPD versions antérieures à 23.4R1
- Paragon Active Assurance versions antérieures à 4.2.1
- Paragon Active Assurance versions antérieures à 4.3.0
- Junos OS gamme EX4300 versions antérieures à 20.4R3-S10, 21.2R3-S7 et 21.4R3-S6
- Junos OS gammes QFX5000 Series, EX4400 Series, EX4100 Series et EX4650 Series versions antérieures à 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1
- Junos OS gammes SRX Branch Series versions antérieures à 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2 et 23.2R1
- Junos OS gammes MX Series avec SPC3 et MS-MPC versions antérieures à 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1
- Junos OS gamme SRX 5000 Series avec SPC2 versions antérieures à 21.2R3-S7, 21.4, 22.1, 22.2, 22.3, 22.4 et 23.2
- Junos OS gammes MX Series versions antérieures à 20.4R3-S5, 21.1, 21.2R3-S1, 21.3, 21.4R3, 22.1R2, 22.2R2 et 22.3
- Junos OS gamme EX9200-15C versions antérieures à 21.2R3-S1, 21.4R3, 22.1R2 et 22.2R2
- Junos OS gammes SRX4600 versions antérieures à 21.2R3-S7, 21.4R3-S6, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R1-S2, 23.2R2 et 23.4R1
- Junos OS gammes ACX5448 et ACX710 versions antérieures à 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2 et 23.2R1
- Junos OS versions antérieures à 20.4R3-S9, 21.1R3, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S2, 22.4R3 et 23.4R2
-
Junos OS Evolved versions antérieures à 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO et 23.4R1-EVO
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eCloud Native Router versions ant\u00e9rieures \u00e0 23.4\u003c/li\u003e \u003cli\u003ecRPD versions ant\u00e9rieures \u00e0 23.4R1\u003c/li\u003e \u003cli\u003eParagon Active Assurance versions ant\u00e9rieures \u00e0 4.2.1\u003c/li\u003e \u003cli\u003eParagon Active Assurance versions ant\u00e9rieures \u00e0 4.3.0\u003c/li\u003e \u003cli\u003eJunos OS gamme EX4300 versions ant\u00e9rieures \u00e0 20.4R3-S10, 21.2R3-S7 et 21.4R3-S6\u003c/li\u003e \u003cli\u003eJunos OS gammes QFX5000 Series, EX4400 Series, EX4100 Series et EX4650 Series versions ant\u00e9rieures \u00e0 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gammes SRX Branch Series versions ant\u00e9rieures \u00e0 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gammes MX Series avec SPC3 et MS-MPC versions ant\u00e9rieures \u00e0 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gamme SRX 5000 Series avec SPC2 versions ant\u00e9rieures \u00e0 21.2R3-S7, 21.4, 22.1, 22.2, 22.3, 22.4 et 23.2\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0MX Series versions ant\u00e9rieures \u00e0 20.4R3-S5, 21.1, 21.2R3-S1, 21.3, 21.4R3, 22.1R2, 22.2R2 et 22.3\u003c/li\u003e \u003cli\u003eJunos OS gamme EX9200-15C versions ant\u00e9rieures \u00e0 21.2R3-S1, 21.4R3, 22.1R2 et 22.2R2\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0SRX4600 versions ant\u00e9rieures \u00e0 21.2R3-S7,\u00a021.4R3-S6,\u00a022.1R3-S5,\u00a022.2R3-S3,\u00a022.3R3-S2,\u00a022.4R3,\u00a023.2R1-S2, 23.2R2 et 23.4R1\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0ACX5448 et ACX710 versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.1R3, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S2, 22.4R3 et 23.4R2\u003c/li\u003e \u003cli\u003e \u003cdiv\u003e \u003cdiv\u003e \u003cp\u003eJunos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO et 23.4R1-EVO\u003c/p\u003e \u003c/div\u003e \u003c/div\u003e \u003c/li\u003e \u003c/ul\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2024-30381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30381"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2020-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1747"
},
{
"name": "CVE-2024-30401",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30401"
},
{
"name": "CVE-2021-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28831"
},
{
"name": "CVE-2024-30409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30409"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2020-14343",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2023-39975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39975"
},
{
"name": "CVE-2024-30410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30410"
},
{
"name": "CVE-2018-7738",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-28957",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28957"
},
{
"name": "CVE-2024-30380",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30380"
},
{
"name": "CVE-2023-41913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41913"
},
{
"name": "CVE-2024-30392",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30392"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23240"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2011-1676",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1676"
},
{
"name": "CVE-2020-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8037"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2020-19190",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19190"
},
{
"name": "CVE-2024-30391",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30391"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-30389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30389"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-3592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3592"
},
{
"name": "CVE-2020-19187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19187"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2019-9923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9923"
},
{
"name": "CVE-2021-39534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39534"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30398"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2020-19188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19188"
},
{
"name": "CVE-2020-19186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19186"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-25659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
},
{
"name": "CVE-2021-39531",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39531"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2011-1675",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1675"
},
{
"name": "CVE-2023-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28366"
},
{
"name": "CVE-2024-30378",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30378"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2021-34434",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34434"
},
{
"name": "CVE-2016-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10009"
},
{
"name": "CVE-2023-1428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1428"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-30402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30402"
},
{
"name": "CVE-2018-1000215",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000215"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2024-30403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30403"
},
{
"name": "CVE-2021-36159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36159"
},
{
"name": "CVE-2018-1000654",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000654"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2021-30139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30139"
},
{
"name": "CVE-2024-30384",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30384"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2024-30387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30387"
},
{
"name": "CVE-2017-18018",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18018"
},
{
"name": "CVE-2024-30406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30406"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2024-30394",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30394"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-30407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30407"
},
{
"name": "CVE-2020-36242",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
},
{
"name": "CVE-2023-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4785"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2020-27350",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27350"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2021-39533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39533"
},
{
"name": "CVE-2024-30390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30390"
},
{
"name": "CVE-2020-19185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19185"
},
{
"name": "CVE-2023-0809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0809"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2020-19189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2024-30388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30388"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2024-30386",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30386"
},
{
"name": "CVE-2021-33560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33560"
},
{
"name": "CVE-2011-1677",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1677"
},
{
"name": "CVE-2018-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
},
{
"name": "CVE-2020-28928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28928"
},
{
"name": "CVE-2021-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41039"
},
{
"name": "CVE-2024-30382",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30382"
},
{
"name": "CVE-2018-20482",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20482"
},
{
"name": "CVE-2021-40528",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40528"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2020-28493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28493"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2011-1089",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1089"
},
{
"name": "CVE-2024-30405",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30405"
},
{
"name": "CVE-2024-30397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30397"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2024-30395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30395"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0297",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79102 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-libslax-Multiple-vulnerabilities-in-libslax-resolved?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79106 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Juniper-Cloud-Native-Router-Multiple-vulnerabilities-resolved-in-23-4-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79181 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-When-MAC-learning-happens-and-an-interface-gets-flapped-the-PFE-crashes-CVE-2024-30403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79186 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-If-a-specific-CLI-command-is-issued-PFE-crashes-will-occur-CVE-2024-30384?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79089 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX-Series-Specific-malformed-LACP-packets-will-cause-flaps-CVE-2024-30388?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79173 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Paragon-Active-Assurance-probe-serviced-exposes-internal-objects-to-local-users-CVE-2024-30381?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79104 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-ACX-Series-with-Paragon-Active-Assurance-Test-Agent-A-local-high-privileged-attacker-can-recover-other-administrators-credentials-CVE-2024-30406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79094 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-A-specific-EVPN-type-5-route-causes-rpd-crash-CVE-2024-30394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79183 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-Connection-limits-is-not-being-enforced-while-the-resp-rate-limit-is-being-enforced-CVE-2024-30390?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79176 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX4600-Series-A-high-amount-of-specific-traffic-causes-packet-drops-and-an-eventual-PFE-crash-CVE-2024-30398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79179 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-An-invalid-certificate-causes-a-Denial-of-Service-in-the-Internet-Key-Exchange-IKE-process-CVE-2024-30397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79187 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-ACX5448-ACX710-Due-to-the-interface-flaps-the-PFE-process-can-crash-CVE-2024-30387?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79109 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-bbe-smgd-process-crash-upon-execution-of-specific-CLI-commands-CVE-2024-30378?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79171 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-l2cpd-crash-upon-receipt-of-a-specific-TLV-CVE-2024-30380?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79188 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-SRX-Series-When-IPsec-authentication-is-configured-with-hmac-sha-384-and-hmac-sha-512-no-authentication-of-traffic-is-performed-CVE-2024-30391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79099 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Higher-CPU-consumption-on-routing-engine-leads-to-Denial-of-Service-DoS-CVE-2024-30409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79184 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-EVPN-VXLAN-scenario-state-changes-on-adjacent-systems-can-cause-an-l2ald-process-crash-CVE-2024-30386?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79110 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-15C-Stack-based-buffer-overflow-in-aftman-CVE-2024-30401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79174 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-RPD-crash-when-CoS-based-forwarding-CBF-policy-is-configured-CVE-2024-30382?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79095 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-malformed-BGP-tunnel-encapsulation-attribute-will-lead-to-an-rpd-crash-CVE-2024-30395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79100 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-Loopback-filter-not-blocking-traffic-despite-having-discard-term-CVE-2024-30410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79107 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-cRPD-Multiple-vulnerabilities-resolved-in-23-4R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79092 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-MS-MPC-MIC-When-URL-filtering-is-enabled-and-a-specific-URL-request-is-received-a-flowd-crash-occurs-CVE-2024-30392?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79185 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-Firewall-filter-not-blocking-egress-traffic-CVE-2024-30389?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79108 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-cURL-vulnerabilities-resolved?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79091 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX-Branch-Series-When-DNS-proxy-is-configured-and-specific-DNS-queries-are-received-resolver-s-performance-is-degraded-CVE-2022-2795?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79180 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-l2ald-crashes-on-receiving-telemetry-messages-from-a-specific-subscription-CVE-2024-30402?language=en_US"
}
]
}
CERTFR-2025-AVI-0627
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere | WebSphere Remote Server sans le dernier correctif de sécurité | ||
| IBM | QRadar | Security QRadar Network Threat Analytics versions antérieures à 1.4.0 | ||
| IBM | Db2 | DB2 Data Management Console versions antérieures à 5.1.2 sur CPD | ||
| IBM | Db2 Query Management Facility | DB2 Query Management Facility versions 13.1.x sans le dernier correctif de sécurité | ||
| IBM | Db2 | DB2 Data Management Console versions antérieures à 3.1.13.1 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere Remote Server sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar Network Threat Analytics versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console versions ant\u00e9rieures \u00e0 5.1.2 sur CPD",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Query Management Facility versions 13.1.x sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Db2 Query Management Facility",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console versions ant\u00e9rieures \u00e0 3.1.13.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-5629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5629"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
},
{
"name": "CVE-2023-46298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46298"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2024-1135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1135"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3121"
},
{
"name": "CVE-2024-52046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52046"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2024-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6827"
},
{
"name": "CVE-2025-2900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2900"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2023-32305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32305"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0627",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-07-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240466",
"url": "https://www.ibm.com/support/pages/node/7240466"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240530",
"url": "https://www.ibm.com/support/pages/node/7240530"
},
{
"published_at": "2025-07-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240471",
"url": "https://www.ibm.com/support/pages/node/7240471"
},
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240267",
"url": "https://www.ibm.com/support/pages/node/7240267"
},
{
"published_at": "2025-07-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240474",
"url": "https://www.ibm.com/support/pages/node/7240474"
},
{
"published_at": "2025-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240250",
"url": "https://www.ibm.com/support/pages/node/7240250"
}
]
}
CERTFR-2024-AVI-0579
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | Spectrum Control versions antérieures à 5.4.12 | ||
| IBM | WebSphere | WebSphere Application Server versions 8.5.x antérieures à 8.5.5.25 sans le correctif de sécurité PH61489 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.x antérieures à 9.0.5.20 sans le correctif de sécurité PH61489 | ||
| IBM | QRadar | QRadar Deployment Intelligence App versions antérieures à 3.0.14 | ||
| IBM | QRadar | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP9 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions antérieures à 1.10.23.0 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 sans le correctif de sécurité 9211224a.240708.epkg.Z | ||
| IBM | QRadar | QRadar Suite Software versions antérieures à 1.10.23.0 | ||
| IBM | QRadar | Security QRadar EDR versions antérieures à 3.12.9 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 sans le correctif de sécurité 9211224a.240708.epkg.Z | ||
| IBM | QRadar | QRadar WinCollect Agent versions antérieures à 10.1.11 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Spectrum Control versions ant\u00e9rieures \u00e0 5.4.12",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.5.25 sans le correctif de s\u00e9curit\u00e9 PH61489",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 9.0.x ant\u00e9rieures \u00e0 9.0.5.20 sans le correctif de s\u00e9curit\u00e9 PH61489",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.14",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP9",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions ant\u00e9rieures \u00e0 1.10.23.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 sans le correctif de s\u00e9curit\u00e9 9211224a.240708.epkg.Z",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.10.23.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions ant\u00e9rieures \u00e0 3.12.9",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 sans le correctif de s\u00e9curit\u00e9 9211224a.240708.epkg.Z",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar WinCollect Agent versions ant\u00e9rieures \u00e0 10.1.11",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2024-1597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2024-35154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35154"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2024-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3772"
},
{
"name": "CVE-2023-50312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50312"
},
{
"name": "CVE-2024-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
},
{
"name": "CVE-2024-28102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28102"
},
{
"name": "CVE-2024-34069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2024-34997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34997"
},
{
"name": "CVE-2022-3287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3287"
},
{
"name": "CVE-2020-13936",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2023-45802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45802"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2024-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34062"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
},
{
"name": "CVE-2024-28176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
},
{
"name": "CVE-2024-1135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1135"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2379"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-31122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31122"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-51775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-3019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3019"
},
{
"name": "CVE-2024-5206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5206"
},
{
"name": "CVE-2024-27088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27088"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2023-44483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44483"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27270"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2024-6387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
},
{
"name": "CVE-2024-25023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25023"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2021-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0579",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159768",
"url": "https://www.ibm.com/support/pages/node/7159768"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160017",
"url": "https://www.ibm.com/support/pages/node/7160017"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159781",
"url": "https://www.ibm.com/support/pages/node/7159781"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160014",
"url": "https://www.ibm.com/support/pages/node/7160014"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160134",
"url": "https://www.ibm.com/support/pages/node/7160134"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159771",
"url": "https://www.ibm.com/support/pages/node/7159771"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159867",
"url": "https://www.ibm.com/support/pages/node/7159867"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159865",
"url": "https://www.ibm.com/support/pages/node/7159865"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159527",
"url": "https://www.ibm.com/support/pages/node/7159527"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159825",
"url": "https://www.ibm.com/support/pages/node/7159825"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159934",
"url": "https://www.ibm.com/support/pages/node/7159934"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159920",
"url": "https://www.ibm.com/support/pages/node/7159920"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160013",
"url": "https://www.ibm.com/support/pages/node/7160013"
}
]
}
CERTFR-2024-AVI-0878
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.2.x antérieures à 9.2.3 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.1.x antérieures à 9.1.6 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.3.x antérieures à 9.3.1 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2308.x antérieures à 9.1.2308.208 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.205 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2403.x antérieures à 9.2.2403.108 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Entreprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.3",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2308.x ant\u00e9rieures \u00e0 9.1.2308.208",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.205",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2403.x ant\u00e9rieures \u00e0 9.2.2403.108",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2017-14159",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14159"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2020-36230",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36230"
},
{
"name": "CVE-2024-45733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45733"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2020-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36221"
},
{
"name": "CVE-2024-45731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45731"
},
{
"name": "CVE-2019-13057",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13057"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-29401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29401"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2015-3276",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3276"
},
{
"name": "CVE-2020-36225",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36225"
},
{
"name": "CVE-2024-45739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45739"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2020-36224",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36224"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2021-27212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27212"
},
{
"name": "CVE-2020-36228",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36228"
},
{
"name": "CVE-2020-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36227"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2020-15719",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15719"
},
{
"name": "CVE-2024-45740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45740"
},
{
"name": "CVE-2024-45736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45736"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-39320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
},
{
"name": "CVE-2017-17740",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17740"
},
{
"name": "CVE-2024-45741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45741"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2020-36223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36223"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-45737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45737"
},
{
"name": "CVE-2020-36229",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36229"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-45732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45732"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-45735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45735"
},
{
"name": "CVE-2023-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50658"
},
{
"name": "CVE-2023-47108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47108"
},
{
"name": "CVE-2023-26125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26125"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-45738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45738"
},
{
"name": "CVE-2020-36226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36226"
},
{
"name": "CVE-2020-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36222"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2022-42969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42969"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2019-13565",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13565"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-45734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45734"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0878",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1008",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1008"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1005",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1005"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1006",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1006"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1002",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1002"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1003",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1003"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1007",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1007"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1004",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1004"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1010",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1010"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1011",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1011"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1012",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1012"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1009",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1009"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1001",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1001"
}
]
}
CERTFR-2024-AVI-0670
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Splunk Machine Learning Toolkit. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Machine Learning Toolkit | Machine Learning Toolkit versions antérieures à 5.4.2 avec un version de Python for Scientific Computing antérieures à 4.2.1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Machine Learning Toolkit versions ant\u00e9rieures \u00e0 5.4.2 avec un version de Python for Scientific Computing ant\u00e9rieures \u00e0 4.2.1 ",
"product": {
"name": "Machine Learning Toolkit",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-31583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31583"
},
{
"name": "CVE-2022-25882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25882"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3772"
},
{
"name": "CVE-2020-28975",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28975"
},
{
"name": "CVE-2024-3568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3568"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-7018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7018"
},
{
"name": "CVE-2024-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34062"
},
{
"name": "CVE-2024-27319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27319"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-27318",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27318"
},
{
"name": "CVE-2022-45907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45907"
},
{
"name": "CVE-2020-28473",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28473"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-6730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6730"
},
{
"name": "CVE-2024-5206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5206"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-31580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31580"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2800"
},
{
"name": "CVE-2022-31799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31799"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-25399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25399"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0670",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk Machine Learning Toolkit. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk Machine Learning Toolkit",
"vendor_advisories": [
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0801",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0801"
}
]
}
CERTFR-2024-AVI-0741
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Secure Analytics. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions antérieures à 7.5.0 UP9 IF02 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP9 IF02",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2024-42472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42472"
},
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-4692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4692"
},
{
"name": "CVE-2024-27059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27059"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-26974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
},
{
"name": "CVE-2024-26897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
},
{
"name": "CVE-2021-47055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47055"
},
{
"name": "CVE-2020-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36777"
},
{
"name": "CVE-2023-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43788"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2023-52878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
},
{
"name": "CVE-2021-47185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47185"
},
{
"name": "CVE-2024-23650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23650"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2024-5564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2024-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2024-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2022-3287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3287"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-26859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
},
{
"name": "CVE-2020-13936",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3652"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2023-45802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45802"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2021-47311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2024-26643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26643"
},
{
"name": "CVE-2024-26779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
},
{
"name": "CVE-2024-32021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32021"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24806"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2024-27048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27048"
},
{
"name": "CVE-2021-47013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2021-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-47073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47073"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2022-48627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
},
{
"name": "CVE-2021-47171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47171"
},
{
"name": "CVE-2024-26743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26743"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2021-47236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2024-32004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32004"
},
{
"name": "CVE-2021-47118",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47118"
},
{
"name": "CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-32020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32020"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-32487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2021-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47153"
},
{
"name": "CVE-2024-35888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2023-31122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31122"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2019-14865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14865"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2024-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2357"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-26919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26919"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-3019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3019"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2024-32465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32465"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-43789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43789"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2023-4693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4693"
},
{
"name": "CVE-2021-46972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46972"
},
{
"name": "CVE-2023-52578",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2021-46934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46934"
},
{
"name": "CVE-2024-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1048"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26693"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2023-52610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2022-39253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39253"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-26872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26872"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2024-26982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
},
{
"name": "CVE-2021-47310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
},
{
"name": "CVE-2023-52626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2024-26744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26744"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2021-47456",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47456"
},
{
"name": "CVE-2021-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
},
{
"name": "CVE-2024-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
},
{
"name": "CVE-2022-48669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48669"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2021-47356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
},
{
"name": "CVE-2024-26694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26694"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2021-47353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47353"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2018-25091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25091"
},
{
"name": "CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2021-46909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46909"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0741",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-05T00:00:00.000000"
},
{
"description": "Ajout r\u00e9f\u00e9rence \u00e9diteur",
"revision_date": "2024-09-06T00:00:00.000000"
},
{
"description": "Correction d\u0027identifiants CVE erron\u00e9s",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Secure Analytics. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Secure Analytics",
"vendor_advisories": [
{
"published_at": "2024-09-30",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA86686",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP9-IF02"
}
]
}
CERTFR-2024-AVI-0086
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Secure Analytics - Log Collector versions antérieures à v1.8.4 | ||
| Juniper Networks | Secure Analytics | Secure Analytics - Deployment Intelligence App versions antérieures à 3.0.12 | ||
| Juniper Networks | Secure Analytics | Secure Analytics versions antérieures à 7.5.0 UP7 | ||
| Juniper Networks | Secure Analytics | Secure Analytics - User Behavior Analytics Application add-on versions antérieures à 4.1.14 | ||
| Juniper Networks | Secure Analytics | Secure Analytics - SOAR Plugin App versions antérieures à 5.3.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Secure Analytics - Log Collector versions ant\u00e9rieures \u00e0 v1.8.4",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Secure Analytics - Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.12",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP7",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Secure Analytics - User Behavior Analytics Application add-on versions ant\u00e9rieures \u00e0 4.1.14",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Secure Analytics - SOAR Plugin App versions ant\u00e9rieures \u00e0 5.3.1",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38020"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2021-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2023-46136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-21611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21611"
},
{
"name": "CVE-2021-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31684"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38019"
},
{
"name": "CVE-2023-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38263"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0086",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA76715 du 1 f\u00e9vrier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-7-5-0-UP7-IF04?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA76718 du 1 f\u00e9vrier 2024",
"url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-JSA-Series-Multiple-vulnerabilities-resolved-in-JSA-Applications?language=en_US"
}
]
}
RHSA-2023:6158
Vulnerability from csaf_redhat - Published: 2023-10-30 01:22 - Updated: 2026-01-13 22:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Ansible Automation Platform 2.4\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.\n\nSecurity Fix(es):\n\n* automation-controller: Django: Denial-of-service possibility in django.utils.text.Truncator (CVE-2023-43665)\n\n* python3-urllib3/python39-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nUpdates and fixes for automation controller:\n* automation-controller has been updated to 4.4.7\n* Cleaned up SOS report passwords (AAP-17544)\n* Customers using the \"infra.controller_configuration\" collection (which uses \"ansible.controller\" collection) to update their Ansible Automation Platform environment no longer receive an HTTP 499 response (AAP-17422)\n\nAdditional changes:\n* python3-urllib3/python39-urllib3 has been updated to 1.26.18",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6158",
"url": "https://access.redhat.com/errata/RHSA-2023:6158"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2241046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241046"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6158.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update",
"tracking": {
"current_release_date": "2026-01-13T22:51:46+00:00",
"generator": {
"date": "2026-01-13T22:51:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:6158",
"initial_release_date": "2023-10-30T01:22:34+00:00",
"revision_history": [
{
"date": "2023-10-30T01:22:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-10-30T01:22:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:51:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ansible Automation Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-0:1.26.18-1.el9ap.src",
"product": {
"name": "python-urllib3-0:1.26.18-1.el9ap.src",
"product_id": "python-urllib3-0:1.26.18-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.26.18-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.4.7-1.el9ap.src",
"product": {
"name": "automation-controller-0:4.4.7-1.el9ap.src",
"product_id": "automation-controller-0:4.4.7-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.4.7-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-urllib3-0:1.26.18-1.el8ap.src",
"product": {
"name": "python3x-urllib3-0:1.26.18-1.el8ap.src",
"product_id": "python3x-urllib3-0:1.26.18-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-urllib3@1.26.18-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.4.7-1.el8ap.src",
"product": {
"name": "automation-controller-0:4.4.7-1.el8ap.src",
"product_id": "automation-controller-0:4.4.7-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.4.7-1.el8ap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-urllib3-0:1.26.18-1.el9ap.noarch",
"product": {
"name": "python3-urllib3-0:1.26.18-1.el9ap.noarch",
"product_id": "python3-urllib3-0:1.26.18-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-urllib3@1.26.18-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-cli-0:4.4.7-1.el9ap.noarch",
"product": {
"name": "automation-controller-cli-0:4.4.7-1.el9ap.noarch",
"product_id": "automation-controller-cli-0:4.4.7-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-cli@4.4.7-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-server-0:4.4.7-1.el9ap.noarch",
"product": {
"name": "automation-controller-server-0:4.4.7-1.el9ap.noarch",
"product_id": "automation-controller-server-0:4.4.7-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-server@4.4.7-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-ui-0:4.4.7-1.el9ap.noarch",
"product": {
"name": "automation-controller-ui-0:4.4.7-1.el9ap.noarch",
"product_id": "automation-controller-ui-0:4.4.7-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-ui@4.4.7-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-urllib3-0:1.26.18-1.el8ap.noarch",
"product": {
"name": "python39-urllib3-0:1.26.18-1.el8ap.noarch",
"product_id": "python39-urllib3-0:1.26.18-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-urllib3@1.26.18-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-cli-0:4.4.7-1.el8ap.noarch",
"product": {
"name": "automation-controller-cli-0:4.4.7-1.el8ap.noarch",
"product_id": "automation-controller-cli-0:4.4.7-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-cli@4.4.7-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-server-0:4.4.7-1.el8ap.noarch",
"product": {
"name": "automation-controller-server-0:4.4.7-1.el8ap.noarch",
"product_id": "automation-controller-server-0:4.4.7-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-server@4.4.7-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-ui-0:4.4.7-1.el8ap.noarch",
"product": {
"name": "automation-controller-ui-0:4.4.7-1.el8ap.noarch",
"product_id": "automation-controller-ui-0:4.4.7-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-ui@4.4.7-1.el8ap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.4.7-1.el9ap.x86_64",
"product": {
"name": "automation-controller-0:4.4.7-1.el9ap.x86_64",
"product_id": "automation-controller-0:4.4.7-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.4.7-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64",
"product": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64",
"product_id": "automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.4.7-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.4.7-1.el8ap.x86_64",
"product": {
"name": "automation-controller-0:4.4.7-1.el8ap.x86_64",
"product_id": "automation-controller-0:4.4.7-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.4.7-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64",
"product": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64",
"product_id": "automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.4.7-1.el8ap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.4.7-1.el9ap.ppc64le",
"product": {
"name": "automation-controller-0:4.4.7-1.el9ap.ppc64le",
"product_id": "automation-controller-0:4.4.7-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.4.7-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le",
"product": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le",
"product_id": "automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.4.7-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.4.7-1.el8ap.ppc64le",
"product": {
"name": "automation-controller-0:4.4.7-1.el8ap.ppc64le",
"product_id": "automation-controller-0:4.4.7-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.4.7-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le",
"product": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le",
"product_id": "automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.4.7-1.el8ap?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.4.7-1.el9ap.s390x",
"product": {
"name": "automation-controller-0:4.4.7-1.el9ap.s390x",
"product_id": "automation-controller-0:4.4.7-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.4.7-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x",
"product": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x",
"product_id": "automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.4.7-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.4.7-1.el8ap.s390x",
"product": {
"name": "automation-controller-0:4.4.7-1.el8ap.s390x",
"product_id": "automation-controller-0:4.4.7-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.4.7-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x",
"product": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x",
"product_id": "automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.4.7-1.el8ap?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.4.7-1.el9ap.aarch64",
"product": {
"name": "automation-controller-0:4.4.7-1.el9ap.aarch64",
"product_id": "automation-controller-0:4.4.7-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.4.7-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64",
"product": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64",
"product_id": "automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.4.7-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.4.7-1.el8ap.aarch64",
"product": {
"name": "automation-controller-0:4.4.7-1.el8ap.aarch64",
"product_id": "automation-controller-0:4.4.7-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.4.7-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64",
"product": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64",
"product_id": "automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.4.7-1.el8ap?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.4.7-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.aarch64"
},
"product_reference": "automation-controller-0:4.4.7-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.4.7-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-0:4.4.7-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.4.7-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.s390x"
},
"product_reference": "automation-controller-0:4.4.7-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.4.7-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.src"
},
"product_reference": "automation-controller-0:4.4.7-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.4.7-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.x86_64"
},
"product_reference": "automation-controller-0:4.4.7-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.4.7-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el8ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.4.7-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.4.7-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el8ap.noarch"
},
"product_reference": "automation-controller-server-0:4.4.7-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.4.7-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el8ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.4.7-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.26.18-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:python39-urllib3-0:1.26.18-1.el8ap.noarch"
},
"product_reference": "python39-urllib3-0:1.26.18-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-urllib3-0:1.26.18-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:python3x-urllib3-0:1.26.18-1.el8ap.src"
},
"product_reference": "python3x-urllib3-0:1.26.18-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.4.7-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.aarch64"
},
"product_reference": "automation-controller-0:4.4.7-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.4.7-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-0:4.4.7-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.4.7-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.s390x"
},
"product_reference": "automation-controller-0:4.4.7-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.4.7-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.src"
},
"product_reference": "automation-controller-0:4.4.7-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.4.7-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.x86_64"
},
"product_reference": "automation-controller-0:4.4.7-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.4.7-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el9ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.4.7-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.4.7-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el9ap.noarch"
},
"product_reference": "automation-controller-server-0:4.4.7-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.4.7-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el9ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.4.7-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.26.18-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:python-urllib3-0:1.26.18-1.el9ap.src"
},
"product_reference": "python-urllib3-0:1.26.18-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-0:1.26.18-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:python3-urllib3-0:1.26.18-1.el9ap.noarch"
},
"product_reference": "python3-urllib3-0:1.26.18-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43665",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-09-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:python39-urllib3-0:1.26.18-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:python3x-urllib3-0:1.26.18-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:python-urllib3-0:1.26.18-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:python3-urllib3-0:1.26.18-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241046"
}
],
"notes": [
{
"category": "description",
"text": "An inefficient regular expression complexity was found in Django. The text truncator regular expressions exhibit linear backtracking complexity, which can be slow, leading to a potential denial of service, given certain HTML inputs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-django: Denial-of-service possibility in django.utils.text.Truncator",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:python39-urllib3-0:1.26.18-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:python3x-urllib3-0:1.26.18-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:python-urllib3-0:1.26.18-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:python3-urllib3-0:1.26.18-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43665"
},
{
"category": "external",
"summary": "RHBZ#2241046",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241046"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43665"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43665",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43665"
},
{
"category": "external",
"summary": "https://www.djangoproject.com/weblog/2023/oct/04/security-releases/",
"url": "https://www.djangoproject.com/weblog/2023/oct/04/security-releases/"
}
],
"release_date": "2023-10-04T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T01:22:34+00:00",
"details": "Red Hat Ansible Automation Platform",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6158"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:python39-urllib3-0:1.26.18-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:python3x-urllib3-0:1.26.18-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:python-urllib3-0:1.26.18-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:python3-urllib3-0:1.26.18-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-django: Denial-of-service possibility in django.utils.text.Truncator"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.4:python39-urllib3-0:1.26.18-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:python3x-urllib3-0:1.26.18-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.4:python-urllib3-0:1.26.18-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:python3-urllib3-0:1.26.18-1.el9ap.noarch"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T01:22:34+00:00",
"details": "Red Hat Ansible Automation Platform",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4:python39-urllib3-0:1.26.18-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:python3x-urllib3-0:1.26.18-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.4:python-urllib3-0:1.26.18-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:python3-urllib3-0:1.26.18-1.el9ap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6158"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:python39-urllib3-0:1.26.18-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:python3x-urllib3-0:1.26.18-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:python-urllib3-0:1.26.18-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:python3-urllib3-0:1.26.18-1.el9ap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:python39-urllib3-0:1.26.18-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:python3x-urllib3-0:1.26.18-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.4.7-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.4.7-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.4.7-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:python-urllib3-0:1.26.18-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:python3-urllib3-0:1.26.18-1.el9ap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
}
]
}
RHSA-2024:2159
Vulnerability from csaf_redhat - Published: 2024-04-30 10:30 - Updated: 2026-01-13 22:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11-urllib3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2159",
"url": "https://access.redhat.com/errata/RHSA-2024:2159"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2159.json"
}
],
"title": "Red Hat Security Advisory: python3.11-urllib3 security update",
"tracking": {
"current_release_date": "2026-01-13T22:52:02+00:00",
"generator": {
"date": "2026-01-13T22:52:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2024:2159",
"initial_release_date": "2024-04-30T10:30:15+00:00",
"revision_history": [
{
"date": "2024-04-30T10:30:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-30T10:30:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:52:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-2.el9.src",
"product": {
"name": "python3.11-urllib3-0:1.26.12-2.el9.src",
"product_id": "python3.11-urllib3-0:1.26.12-2.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-2.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-2.el9.noarch",
"product": {
"name": "python3.11-urllib3-0:1.26.12-2.el9.noarch",
"product_id": "python3.11-urllib3-0:1.26.12-2.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-2.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-2.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.noarch"
},
"product_reference": "python3.11-urllib3-0:1.26.12-2.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-2.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.src"
},
"product_reference": "python3.11-urllib3-0:1.26.12-2.el9.src",
"relates_to_product_reference": "AppStream-9.4.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.noarch",
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:30:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.noarch",
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2159"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.noarch",
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.noarch",
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
}
]
}
RHSA-2024:0133
Vulnerability from csaf_redhat - Published: 2024-01-10 12:07 - Updated: 2026-01-13 22:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0133",
"url": "https://access.redhat.com/errata/RHSA-2024:0133"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2226586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0133.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security update",
"tracking": {
"current_release_date": "2026-01-13T22:51:53+00:00",
"generator": {
"date": "2026-01-13T22:51:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2024:0133",
"initial_release_date": "2024-01-10T12:07:58+00:00",
"revision_history": [
{
"date": "2024-01-10T12:07:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-10T12:07:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:51:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::resilientstorage"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.2.1-121.el8_9.2.src",
"product": {
"name": "fence-agents-0:4.2.1-121.el8_9.2.src",
"product_id": "fence-agents-0:4.2.1-121.el8_9.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.2.1-121.el8_9.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"product": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"product_id": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-121.el8_9.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"product_id": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-121.el8_9.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"product_id": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-121.el8_9.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"product_id": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-121.el8_9.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"product_id": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-121.el8_9.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"product_id": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-121.el8_9.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-121.el8_9.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-121.el8_9.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"product": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"product_id": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-121.el8_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"product": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"product_id": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-121.el8_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"product_id": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-121.el8_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"product": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"product_id": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-121.el8_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"product_id": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-121.el8_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"product_id": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-121.el8_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-121.el8_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-121.el8_9.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"product": {
"name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"product_id": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-121.el8_9.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"product": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"product_id": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-121.el8_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"product_id": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-121.el8_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"product_id": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-121.el8_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"product_id": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-121.el8_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"product_id": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-121.el8_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"product": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-121.el8_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"product_id": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-121.el8_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-121.el8_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-121.el8_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"product_id": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-121.el8_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"product": {
"name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"product_id": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-121.el8_9.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"product": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"product_id": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-121.el8_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"product": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"product_id": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-121.el8_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"product_id": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-121.el8_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"product": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"product_id": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-121.el8_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"product_id": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-121.el8_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"product_id": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-121.el8_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-121.el8_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-121.el8_9.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-zvm@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-121.el8_9.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"product": {
"name": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"product_id": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-121.el8_9.2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-121.el8_9.2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src"
},
"product_reference": "fence-agents-0:4.2.1-121.el8_9.2.src",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-121.el8_9.2.src as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src"
},
"product_reference": "fence-agents-0:4.2.1-121.el8_9.2.src",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)",
"product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-121.el8_9.2.src as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src"
},
"product_reference": "fence-agents-0:4.2.1-121.el8_9.2.src",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)",
"product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2023-07-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2226586"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-certifi: Removal of e-Tugra root certificate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-37920"
},
{
"category": "external",
"summary": "RHBZ#2226586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920"
}
],
"release_date": "2023-07-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-10T12:07:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0133"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python-certifi: Removal of e-Tugra root certificate"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-10T12:07:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0133"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch",
"ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
}
]
}
RHSA-2023_7523
Vulnerability from csaf_redhat - Published: 2023-11-28 15:32 - Updated: 2024-11-23 01:25Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7523",
"url": "https://access.redhat.com/errata/RHSA-2023:7523"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2226586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7523.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security update",
"tracking": {
"current_release_date": "2024-11-23T01:25:49+00:00",
"generator": {
"date": "2024-11-23T01:25:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:7523",
"initial_release_date": "2023-11-28T15:32:41+00:00",
"revision_history": [
{
"date": "2023-11-28T15:32:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-28T15:32:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-23T01:25:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.4::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.4::highavailability"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.2.1-65.el8_4.13.src",
"product": {
"name": "fence-agents-0:4.2.1-65.el8_4.13.src",
"product_id": "fence-agents-0:4.2.1-65.el8_4.13.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.2.1-65.el8_4.13?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"product": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"product_id": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-65.el8_4.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"product_id": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-65.el8_4.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"product_id": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-65.el8_4.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"product_id": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-65.el8_4.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"product_id": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-65.el8_4.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"product": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-65.el8_4.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"product_id": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-65.el8_4.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-65.el8_4.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-65.el8_4.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"product_id": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-65.el8_4.13?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-65.el8_4.13?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"product": {
"name": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"product_id": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-zvm@4.2.1-65.el8_4.13?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"product": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"product_id": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-65.el8_4.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"product_id": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-65.el8_4.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"product_id": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-65.el8_4.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"product_id": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-65.el8_4.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"product_id": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-65.el8_4.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"product_id": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-65.el8_4.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-65.el8_4.13?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-65.el8_4.13?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"product": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"product_id": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-65.el8_4.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"product": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"product_id": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-65.el8_4.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"product_id": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-65.el8_4.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"product": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"product_id": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-65.el8_4.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"product_id": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-65.el8_4.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"product_id": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-65.el8_4.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-65.el8_4.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-65.el8_4.13?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"product": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"product_id": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-65.el8_4.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"product": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"product_id": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-65.el8_4.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"product_id": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-65.el8_4.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"product": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"product_id": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-65.el8_4.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"product_id": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-65.el8_4.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"product_id": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-65.el8_4.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-65.el8_4.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-65.el8_4.13?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-65.el8_4.13.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src"
},
"product_reference": "fence-agents-0:4.2.1-65.el8_4.13.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-65.el8_4.13.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src"
},
"product_reference": "fence-agents-0:4.2.1-65.el8_4.13.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-65.el8_4.13.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src"
},
"product_reference": "fence-agents-0:4.2.1-65.el8_4.13.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-65.el8_4.13.src as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src"
},
"product_reference": "fence-agents-0:4.2.1-65.el8_4.13.src",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-65.el8_4.13.src as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src"
},
"product_reference": "fence-agents-0:4.2.1-65.el8_4.13.src",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2023-07-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2226586"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-certifi: Removal of e-Tugra root certificate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-37920"
},
{
"category": "external",
"summary": "RHBZ#2226586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920"
}
],
"release_date": "2023-07-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-28T15:32:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7523"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python-certifi: Removal of e-Tugra root certificate"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-28T15:32:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7523"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x",
"HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch",
"HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
}
]
}
RHSA-2024_0733
Vulnerability from csaf_redhat - Published: 2024-02-07 20:46 - Updated: 2024-11-23 03:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Ansible Automation Platform 2.4\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.\n\nSecurity Fix(es):\n\n* ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration (CVE-2024-0690)\n\n* automation-controller: urllib3: Cookie request header isn\u0027t stripped during cross-origin (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nUpdates and fixes for automation controller:\n* Fixed jobs stuck in pending state after connection to database recover (AAP-19618)\n* Added secure flag option for userLoggedIn cookie if \u0027SESSION_COOKIE_SECURE\u0027 is set to \u0027True\u0027 (AAP-19602)\n* Fixed \u0027twilio_backend.py\u0027 to send SMS to multiple destinations (AAP-19284)\n* Fixed rsyslogd from unexpectedly stop sending events to Splunk HTTP Collector and recover rsyslog from 4xx errors (AAP-19069)\n* Fixed a TypeError in the Logging Settings Edit form of the automation controller user interface to no longer render the form inputs inaccessible (AAP-18960)\n* Fixed Delinea (previously: Thycotic) DevOps Secrets Vault credential plugin to work with python-dsv-sdk\u003e=1.0.4 (AAP-18701)\n* Updated schedule Prompt on launch fields to persist while editing (AAP-13859)\n* automation-controller has been updated to 4.5.1\n\nNote: The 2.4-5 installer/setup should be used to update automation controller to 4.5.1\n\nUpdates and fixes for ansible-core:\n* ansible-core has been updated to 2.15.9\n\nUpdates and fixes for installer, setup and setup bundle:\n* Fixed the version check when pinning EDA to an older version (AAP-19399)\n* Fixed rsyslogd from unexpectedly stop sending events to Splunk HTTP Collector and recover rsyslog from 4xx errors (AAP-19069)\n* Automation Hub now uses system crypto-policies in nginx (AAP-18974)\n* installer, setup and setup bundle have been updated to 2.4-5\n\nAdditionally, setup bundle 2.4-5 includes the updates released in the following advisories:\n\nRHSA-2024:0322\n* python3-dynaconf/python39-dynaconf 3.1.12-2\n* python3-gitpython/python39-gitpython 3.1.40\n* python3-twisted/python39-twisted 23.10.0\n\nRHBA-2023:7863\n* container images",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0733",
"url": "https://access.redhat.com/errata/RHSA-2024:0733"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHSA-2024:0322",
"url": "https://access.redhat.com/errata/RHSA-2024:0322"
},
{
"category": "external",
"summary": "https://access.redhat.com/errata/RHBA-2023:7863",
"url": "https://access.redhat.com/errata/RHBA-2023:7863"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "2259013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0733.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update",
"tracking": {
"current_release_date": "2024-11-23T03:39:00+00:00",
"generator": {
"date": "2024-11-23T03:39:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:0733",
"initial_release_date": "2024-02-07T20:46:32+00:00",
"revision_history": [
{
"date": "2024-02-07T20:46:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-02-07T20:46:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-23T03:39:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ansible Automation Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-automation-platform-installer-0:2.4-5.el9ap.src",
"product": {
"name": "ansible-automation-platform-installer-0:2.4-5.el9ap.src",
"product_id": "ansible-automation-platform-installer-0:2.4-5.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-automation-platform-installer@2.4-5.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.5.1-1.el9ap.src",
"product": {
"name": "automation-controller-0:4.5.1-1.el9ap.src",
"product_id": "automation-controller-0:4.5.1-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el9ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.15.9-1.el9ap.src",
"product": {
"name": "ansible-core-1:2.15.9-1.el9ap.src",
"product_id": "ansible-core-1:2.15.9-1.el9ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.15.9-1.el9ap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "ansible-automation-platform-installer-0:2.4-5.el8ap.src",
"product": {
"name": "ansible-automation-platform-installer-0:2.4-5.el8ap.src",
"product_id": "ansible-automation-platform-installer-0:2.4-5.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-automation-platform-installer@2.4-5.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.5.1-1.el8ap.src",
"product": {
"name": "automation-controller-0:4.5.1-1.el8ap.src",
"product_id": "automation-controller-0:4.5.1-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el8ap?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.15.9-1.el8ap.src",
"product": {
"name": "ansible-core-1:2.15.9-1.el8ap.src",
"product_id": "ansible-core-1:2.15.9-1.el8ap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.15.9-1.el8ap?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ansible-automation-platform-installer-0:2.4-5.el9ap.noarch",
"product": {
"name": "ansible-automation-platform-installer-0:2.4-5.el9ap.noarch",
"product_id": "ansible-automation-platform-installer-0:2.4-5.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-automation-platform-installer@2.4-5.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-cli-0:4.5.1-1.el9ap.noarch",
"product": {
"name": "automation-controller-cli-0:4.5.1-1.el9ap.noarch",
"product_id": "automation-controller-cli-0:4.5.1-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-cli@4.5.1-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-server-0:4.5.1-1.el9ap.noarch",
"product": {
"name": "automation-controller-server-0:4.5.1-1.el9ap.noarch",
"product_id": "automation-controller-server-0:4.5.1-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-server@4.5.1-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-ui-0:4.5.1-1.el9ap.noarch",
"product": {
"name": "automation-controller-ui-0:4.5.1-1.el9ap.noarch",
"product_id": "automation-controller-ui-0:4.5.1-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-ui@4.5.1-1.el9ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.15.9-1.el9ap.noarch",
"product": {
"name": "ansible-core-1:2.15.9-1.el9ap.noarch",
"product_id": "ansible-core-1:2.15.9-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.15.9-1.el9ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "ansible-test-1:2.15.9-1.el9ap.noarch",
"product": {
"name": "ansible-test-1:2.15.9-1.el9ap.noarch",
"product_id": "ansible-test-1:2.15.9-1.el9ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-test@2.15.9-1.el9ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "ansible-automation-platform-installer-0:2.4-5.el8ap.noarch",
"product": {
"name": "ansible-automation-platform-installer-0:2.4-5.el8ap.noarch",
"product_id": "ansible-automation-platform-installer-0:2.4-5.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-automation-platform-installer@2.4-5.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-cli-0:4.5.1-1.el8ap.noarch",
"product": {
"name": "automation-controller-cli-0:4.5.1-1.el8ap.noarch",
"product_id": "automation-controller-cli-0:4.5.1-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-cli@4.5.1-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-server-0:4.5.1-1.el8ap.noarch",
"product": {
"name": "automation-controller-server-0:4.5.1-1.el8ap.noarch",
"product_id": "automation-controller-server-0:4.5.1-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-server@4.5.1-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "automation-controller-ui-0:4.5.1-1.el8ap.noarch",
"product": {
"name": "automation-controller-ui-0:4.5.1-1.el8ap.noarch",
"product_id": "automation-controller-ui-0:4.5.1-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-ui@4.5.1-1.el8ap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-core-1:2.15.9-1.el8ap.noarch",
"product": {
"name": "ansible-core-1:2.15.9-1.el8ap.noarch",
"product_id": "ansible-core-1:2.15.9-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-core@2.15.9-1.el8ap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "ansible-test-1:2.15.9-1.el8ap.noarch",
"product": {
"name": "ansible-test-1:2.15.9-1.el8ap.noarch",
"product_id": "ansible-test-1:2.15.9-1.el8ap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-test@2.15.9-1.el8ap?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.5.1-1.el9ap.x86_64",
"product": {
"name": "automation-controller-0:4.5.1-1.el9ap.x86_64",
"product_id": "automation-controller-0:4.5.1-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64",
"product": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64",
"product_id": "automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el9ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.5.1-1.el8ap.x86_64",
"product": {
"name": "automation-controller-0:4.5.1-1.el8ap.x86_64",
"product_id": "automation-controller-0:4.5.1-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el8ap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64",
"product": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64",
"product_id": "automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el8ap?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.5.1-1.el9ap.ppc64le",
"product": {
"name": "automation-controller-0:4.5.1-1.el9ap.ppc64le",
"product_id": "automation-controller-0:4.5.1-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le",
"product": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le",
"product_id": "automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el9ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.5.1-1.el8ap.ppc64le",
"product": {
"name": "automation-controller-0:4.5.1-1.el8ap.ppc64le",
"product_id": "automation-controller-0:4.5.1-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el8ap?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le",
"product": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le",
"product_id": "automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el8ap?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.5.1-1.el9ap.s390x",
"product": {
"name": "automation-controller-0:4.5.1-1.el9ap.s390x",
"product_id": "automation-controller-0:4.5.1-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x",
"product": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x",
"product_id": "automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el9ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.5.1-1.el8ap.s390x",
"product": {
"name": "automation-controller-0:4.5.1-1.el8ap.s390x",
"product_id": "automation-controller-0:4.5.1-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el8ap?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x",
"product": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x",
"product_id": "automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el8ap?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "automation-controller-0:4.5.1-1.el9ap.aarch64",
"product": {
"name": "automation-controller-0:4.5.1-1.el9ap.aarch64",
"product_id": "automation-controller-0:4.5.1-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64",
"product": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64",
"product_id": "automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el9ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-0:4.5.1-1.el8ap.aarch64",
"product": {
"name": "automation-controller-0:4.5.1-1.el8ap.aarch64",
"product_id": "automation-controller-0:4.5.1-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller@4.5.1-1.el8ap?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64",
"product": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64",
"product_id": "automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.1-1.el8ap?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.15.9-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch"
},
"product_reference": "ansible-core-1:2.15.9-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.15.9-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src"
},
"product_reference": "ansible-core-1:2.15.9-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.15.9-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch"
},
"product_reference": "ansible-test-1:2.15.9-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.15.9-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch"
},
"product_reference": "ansible-core-1:2.15.9-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.15.9-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src"
},
"product_reference": "ansible-core-1:2.15.9-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.15.9-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch"
},
"product_reference": "ansible-test-1:2.15.9-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-automation-platform-installer-0:2.4-5.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch"
},
"product_reference": "ansible-automation-platform-installer-0:2.4-5.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-automation-platform-installer-0:2.4-5.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src"
},
"product_reference": "ansible-automation-platform-installer-0:2.4-5.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.15.9-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch"
},
"product_reference": "ansible-core-1:2.15.9-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.15.9-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src"
},
"product_reference": "ansible-core-1:2.15.9-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.15.9-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch"
},
"product_reference": "ansible-test-1:2.15.9-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.1-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64"
},
"product_reference": "automation-controller-0:4.5.1-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.1-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-0:4.5.1-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.1-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x"
},
"product_reference": "automation-controller-0:4.5.1-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.1-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src"
},
"product_reference": "automation-controller-0:4.5.1-1.el8ap.src",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.1-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64"
},
"product_reference": "automation-controller-0:4.5.1-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.5.1-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.5.1-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.5.1-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch"
},
"product_reference": "automation-controller-server-0:4.5.1-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.5.1-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.5.1-1.el8ap.noarch",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8",
"product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64",
"relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.15.9-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch"
},
"product_reference": "ansible-core-1:2.15.9-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.15.9-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src"
},
"product_reference": "ansible-core-1:2.15.9-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.15.9-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch"
},
"product_reference": "ansible-test-1:2.15.9-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.15.9-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch"
},
"product_reference": "ansible-core-1:2.15.9-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.15.9-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src"
},
"product_reference": "ansible-core-1:2.15.9-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.15.9-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch"
},
"product_reference": "ansible-test-1:2.15.9-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-automation-platform-installer-0:2.4-5.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch"
},
"product_reference": "ansible-automation-platform-installer-0:2.4-5.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-automation-platform-installer-0:2.4-5.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src"
},
"product_reference": "ansible-automation-platform-installer-0:2.4-5.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.15.9-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch"
},
"product_reference": "ansible-core-1:2.15.9-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-core-1:2.15.9-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src"
},
"product_reference": "ansible-core-1:2.15.9-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-test-1:2.15.9-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch"
},
"product_reference": "ansible-test-1:2.15.9-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.1-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64"
},
"product_reference": "automation-controller-0:4.5.1-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.1-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-0:4.5.1-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.1-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x"
},
"product_reference": "automation-controller-0:4.5.1-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.1-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src"
},
"product_reference": "automation-controller-0:4.5.1-1.el9ap.src",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-0:4.5.1-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64"
},
"product_reference": "automation-controller-0:4.5.1-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-cli-0:4.5.1-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch"
},
"product_reference": "automation-controller-cli-0:4.5.1-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-server-0:4.5.1-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch"
},
"product_reference": "automation-controller-server-0:4.5.1-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-ui-0:4.5.1-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch"
},
"product_reference": "automation-controller-ui-0:4.5.1-1.el9ap.noarch",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64"
},
"product_reference": "automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le"
},
"product_reference": "automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x"
},
"product_reference": "automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9",
"product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64"
},
"product_reference": "automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64",
"relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-07T20:46:32+00:00",
"details": "Red Hat Ansible Automation Platform",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0733"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
},
{
"cve": "CVE-2024-0690",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2024-01-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2259013"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src"
],
"known_not_affected": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0690"
},
{
"category": "external",
"summary": "RHBZ#2259013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0690"
},
{
"category": "external",
"summary": "https://github.com/ansible/ansible/pull/82565",
"url": "https://github.com/ansible/ansible/pull/82565"
}
],
"release_date": "2024-01-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-02-07T20:46:32+00:00",
"details": "Red Hat Ansible Automation Platform",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0733"
},
{
"category": "workaround",
"details": "Explicitly setting \u0027no_log\u0027 within the playbook will prevent the output from containing potentially sensitive information.",
"product_ids": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el8ap.x86_64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.aarch64",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.ppc64le",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.s390x",
"8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el8ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-automation-platform-installer-0:2.4-5.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.1-1.el9ap.x86_64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.1-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.aarch64",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.ppc64le",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.s390x",
"9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.1-1.el9ap.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el8ap.src",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.noarch",
"8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el8ap.src",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.9-1.el9ap.src",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.noarch",
"9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.9-1.el9ap.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration"
}
]
}
RHSA-2024_0300
Vulnerability from csaf_redhat - Published: 2024-01-18 16:31 - Updated: 2024-11-14 00:20Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-urllib3 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0300",
"url": "https://access.redhat.com/errata/RHSA-2024:0300"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0300.json"
}
],
"title": "Red Hat Security Advisory: python-urllib3 security update",
"tracking": {
"current_release_date": "2024-11-14T00:20:51+00:00",
"generator": {
"date": "2024-11-14T00:20:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:0300",
"initial_release_date": "2024-01-18T16:31:24+00:00",
"revision_history": [
{
"date": "2024-01-18T16:31:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-18T16:31:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T00:20:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-0:1.24.2-5.el8_6.1.src",
"product": {
"name": "python-urllib3-0:1.24.2-5.el8_6.1.src",
"product_id": "python-urllib3-0:1.24.2-5.el8_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.24.2-5.el8_6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-urllib3-0:1.24.2-5.el8_6.1.noarch",
"product": {
"name": "python3-urllib3-0:1.24.2-5.el8_6.1.noarch",
"product_id": "python3-urllib3-0:1.24.2-5.el8_6.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-urllib3@1.24.2-5.el8_6.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.24.2-5.el8_6.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src"
},
"product_reference": "python-urllib3-0:1.24.2-5.el8_6.1.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-0:1.24.2-5.el8_6.1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
},
"product_reference": "python3-urllib3-0:1.24.2-5.el8_6.1.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-18T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0300"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-18T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0300"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2023:7385
Vulnerability from csaf_redhat - Published: 2023-11-21 11:31 - Updated: 2026-01-13 22:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7385",
"url": "https://access.redhat.com/errata/RHSA-2023:7385"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2226586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7385.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security update",
"tracking": {
"current_release_date": "2026-01-13T22:51:47+00:00",
"generator": {
"date": "2026-01-13T22:51:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:7385",
"initial_release_date": "2023-11-21T11:31:02+00:00",
"revision_history": [
{
"date": "2023-11-21T11:31:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-21T11:31:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:51:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::resilientstorage"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.10.0-20.el9_0.10.src",
"product": {
"name": "fence-agents-0:4.10.0-20.el9_0.10.src",
"product_id": "fence-agents-0:4.10.0-20.el9_0.10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.10.0-20.el9_0.10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.10.0-20.el9_0.10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-openstack-support@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-openstack-support-debuginfo@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virt@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-cpg@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-libvirt@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-multicast@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-serial@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-tcp@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-openstack-support@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virt-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-cpg-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-libvirt-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-multicast-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-serial-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-tcp-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-cloud-support-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-openstack-support-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-cloud-support@4.10.0-20.el9_0.10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-zvm@4.10.0-20.el9_0.10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-20.el9_0.10.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src"
},
"product_reference": "fence-agents-0:4.10.0-20.el9_0.10.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-20.el9_0.10.src as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src"
},
"product_reference": "fence-agents-0:4.10.0-20.el9_0.10.src",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-20.el9_0.10.src as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src"
},
"product_reference": "fence-agents-0:4.10.0-20.el9_0.10.src",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2023-07-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2226586"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-certifi: Removal of e-Tugra root certificate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-37920"
},
{
"category": "external",
"summary": "RHBZ#2226586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920"
}
],
"release_date": "2023-07-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-21T11:31:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python-certifi: Removal of e-Tugra root certificate"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-21T11:31:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
}
]
}
RHSA-2023:7528
Vulnerability from csaf_redhat - Published: 2023-11-28 15:39 - Updated: 2026-01-13 22:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7528",
"url": "https://access.redhat.com/errata/RHSA-2023:7528"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2226586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7528.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security update",
"tracking": {
"current_release_date": "2026-01-13T22:51:52+00:00",
"generator": {
"date": "2026-01-13T22:51:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:7528",
"initial_release_date": "2023-11-28T15:39:44+00:00",
"revision_history": [
{
"date": "2023-11-28T15:39:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-28T15:39:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:51:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::resilientstorage"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.2.1-112.el8_8.2.src",
"product": {
"name": "fence-agents-0:4.2.1-112.el8_8.2.src",
"product_id": "fence-agents-0:4.2.1-112.el8_8.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.2.1-112.el8_8.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"product": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"product_id": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-112.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"product_id": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-112.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"product_id": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-112.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"product_id": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-112.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"product_id": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-112.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"product_id": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-112.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-112.el8_8.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-112.el8_8.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"product": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"product_id": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-112.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"product": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"product_id": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-112.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"product_id": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-112.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"product": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"product_id": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-112.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"product_id": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-112.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"product_id": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-112.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-112.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-112.el8_8.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"product": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"product_id": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-112.el8_8.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"product": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"product_id": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-112.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"product_id": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-112.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"product_id": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-112.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"product_id": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-112.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"product_id": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-112.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"product": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-112.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"product_id": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-112.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-112.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-112.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"product_id": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-112.el8_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"product": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"product_id": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-112.el8_8.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"product": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"product_id": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-112.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"product": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"product_id": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-112.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"product_id": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-112.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"product": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"product_id": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-112.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"product_id": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-112.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"product_id": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-112.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-112.el8_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-112.el8_8.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-zvm@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-112.el8_8.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"product": {
"name": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"product_id": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-112.el8_8.2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-112.el8_8.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src"
},
"product_reference": "fence-agents-0:4.2.1-112.el8_8.2.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-112.el8_8.2.src as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src"
},
"product_reference": "fence-agents-0:4.2.1-112.el8_8.2.src",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-112.el8_8.2.src as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src"
},
"product_reference": "fence-agents-0:4.2.1-112.el8_8.2.src",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)",
"product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2023-07-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2226586"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-certifi: Removal of e-Tugra root certificate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-37920"
},
{
"category": "external",
"summary": "RHBZ#2226586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920"
}
],
"release_date": "2023-07-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-28T15:39:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7528"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python-certifi: Removal of e-Tugra root certificate"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-28T15:39:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7528"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch",
"ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
}
]
}
RHSA-2024_2159
Vulnerability from csaf_redhat - Published: 2024-04-30 10:30 - Updated: 2024-11-14 00:30Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11-urllib3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2159",
"url": "https://access.redhat.com/errata/RHSA-2024:2159"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2159.json"
}
],
"title": "Red Hat Security Advisory: python3.11-urllib3 security update",
"tracking": {
"current_release_date": "2024-11-14T00:30:20+00:00",
"generator": {
"date": "2024-11-14T00:30:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:2159",
"initial_release_date": "2024-04-30T10:30:15+00:00",
"revision_history": [
{
"date": "2024-04-30T10:30:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-30T10:30:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T00:30:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-2.el9.src",
"product": {
"name": "python3.11-urllib3-0:1.26.12-2.el9.src",
"product_id": "python3.11-urllib3-0:1.26.12-2.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-2.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-2.el9.noarch",
"product": {
"name": "python3.11-urllib3-0:1.26.12-2.el9.noarch",
"product_id": "python3.11-urllib3-0:1.26.12-2.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-2.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-2.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.noarch"
},
"product_reference": "python3.11-urllib3-0:1.26.12-2.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-2.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.src"
},
"product_reference": "python3.11-urllib3-0:1.26.12-2.el9.src",
"relates_to_product_reference": "AppStream-9.4.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.noarch",
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:30:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.noarch",
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2159"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.noarch",
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.noarch",
"AppStream-9.4.0.GA:python3.11-urllib3-0:1.26.12-2.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
}
]
}
RHSA-2023_7385
Vulnerability from csaf_redhat - Published: 2023-11-21 11:31 - Updated: 2024-11-23 01:25Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7385",
"url": "https://access.redhat.com/errata/RHSA-2023:7385"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2226586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7385.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security update",
"tracking": {
"current_release_date": "2024-11-23T01:25:27+00:00",
"generator": {
"date": "2024-11-23T01:25:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:7385",
"initial_release_date": "2023-11-21T11:31:02+00:00",
"revision_history": [
{
"date": "2023-11-21T11:31:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-21T11:31:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-23T01:25:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::resilientstorage"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.10.0-20.el9_0.10.src",
"product": {
"name": "fence-agents-0:4.10.0-20.el9_0.10.src",
"product_id": "fence-agents-0:4.10.0-20.el9_0.10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.10.0-20.el9_0.10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.10.0-20.el9_0.10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"product": {
"name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"product_id": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.10.0-20.el9_0.10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-openstack-support@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-openstack-support-debuginfo@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"product": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virt@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-cpg@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-libvirt@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-multicast@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-serial@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-tcp@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-openstack-support@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virt-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-cpg-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-libvirt-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-multicast-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-serial-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-tcp-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-cloud-support-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-openstack-support-debuginfo@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"product": {
"name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"product_id": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-cloud-support@4.10.0-20.el9_0.10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"product": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"product": {
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"product_id": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-zvm@4.10.0-20.el9_0.10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-20.el9_0.10.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src"
},
"product_reference": "fence-agents-0:4.10.0-20.el9_0.10.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-20.el9_0.10.src as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src"
},
"product_reference": "fence-agents-0:4.10.0-20.el9_0.10.src",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-20.el9_0.10.src as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src"
},
"product_reference": "fence-agents-0:4.10.0-20.el9_0.10.src",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2023-07-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2226586"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-certifi: Removal of e-Tugra root certificate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-37920"
},
{
"category": "external",
"summary": "RHBZ#2226586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920"
}
],
"release_date": "2023-07-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-21T11:31:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7385"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python-certifi: Removal of e-Tugra root certificate"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-21T11:31:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7385"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
}
]
}
RHSA-2024_0464
Vulnerability from csaf_redhat - Published: 2024-01-25 11:05 - Updated: 2024-11-14 00:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-urllib3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0464",
"url": "https://access.redhat.com/errata/RHSA-2024:0464"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0464.json"
}
],
"title": "Red Hat Security Advisory: python-urllib3 security update",
"tracking": {
"current_release_date": "2024-11-14T00:21:35+00:00",
"generator": {
"date": "2024-11-14T00:21:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:0464",
"initial_release_date": "2024-01-25T11:05:15+00:00",
"revision_history": [
{
"date": "2024-01-25T11:05:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-25T11:05:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T00:21:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.3.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-0:1.26.5-3.el9_3.1.src",
"product": {
"name": "python-urllib3-0:1.26.5-3.el9_3.1.src",
"product_id": "python-urllib3-0:1.26.5-3.el9_3.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.26.5-3.el9_3.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-urllib3-0:1.26.5-3.el9_3.1.noarch",
"product": {
"name": "python3-urllib3-0:1.26.5-3.el9_3.1.noarch",
"product_id": "python3-urllib3-0:1.26.5-3.el9_3.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9_3.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.26.5-3.el9_3.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src"
},
"product_reference": "python-urllib3-0:1.26.5-3.el9_3.1.src",
"relates_to_product_reference": "BaseOS-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-0:1.26.5-3.el9_3.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
},
"product_reference": "python3-urllib3-0:1.26.5-3.el9_3.1.noarch",
"relates_to_product_reference": "BaseOS-9.3.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-25T11:05:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0464"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-25T11:05:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0464"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2023:7378
Vulnerability from csaf_redhat - Published: 2023-11-21 11:23 - Updated: 2026-01-13 22:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7378",
"url": "https://access.redhat.com/errata/RHSA-2023:7378"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2226586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7378.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security update",
"tracking": {
"current_release_date": "2026-01-13T22:51:47+00:00",
"generator": {
"date": "2026-01-13T22:51:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2023:7378",
"initial_release_date": "2023-11-21T11:23:51+00:00",
"revision_history": [
{
"date": "2023-11-21T11:23:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-21T11:23:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:51:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-cloud-support@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virt-debuginfo@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-cpg-debuginfo@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-debuginfo@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-libvirt-debuginfo@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-multicast-debuginfo@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-serial-debuginfo@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-tcp-debuginfo@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-cloud-support-debuginfo@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virt@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-cpg@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-libvirt@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-multicast@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-serial@4.10.0-43.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"product": {
"name": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"product_id": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-tcp@4.10.0-43.el9_2.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"product": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"product_id": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-43.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"product": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"product_id": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-43.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"product": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"product_id": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-43.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"product_id": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-43.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"product_id": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-43.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-43.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-43.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"product_id": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-43.el9_2.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"product": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"product_id": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-43.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"product": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"product_id": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-43.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"product": {
"name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"product_id": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-43.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"product": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"product_id": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-43.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"product_id": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-43.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"product_id": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-43.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-43.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-43.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"product": {
"name": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"product_id": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-43.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"product_id": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-43.el9_2.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"product": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"product_id": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-43.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"product": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"product_id": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-43.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"product": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"product_id": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-43.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"product": {
"name": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"product_id": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-zvm@4.10.0-43.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"product_id": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-43.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"product_id": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-43.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-43.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-43.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"product_id": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-43.el9_2.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.10.0-43.el9_2.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"product": {
"name": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"product_id": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.10.0-43.el9_2.2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.10.0-43.el9_2.2.src",
"product": {
"name": "fence-agents-0:4.10.0-43.el9_2.2.src",
"product_id": "fence-agents-0:4.10.0-43.el9_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.10.0-43.el9_2.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-43.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src"
},
"product_reference": "fence-agents-0:4.10.0-43.el9_2.2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-43.el9_2.2.src as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src"
},
"product_reference": "fence-agents-0:4.10.0-43.el9_2.2.src",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)",
"product_id": "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-43.el9_2.2.src as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src"
},
"product_reference": "fence-agents-0:4.10.0-43.el9_2.2.src",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)",
"product_id": "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2023-07-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2226586"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-certifi: Removal of e-Tugra root certificate",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-37920"
},
{
"category": "external",
"summary": "RHBZ#2226586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920"
}
],
"release_date": "2023-07-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-21T11:23:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7378"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python-certifi: Removal of e-Tugra root certificate"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-21T11:23:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7378"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch",
"ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64",
"ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
}
]
}
RHSA-2023_7851
Vulnerability from csaf_redhat - Published: 2023-12-14 16:30 - Updated: 2024-11-23 03:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated Satellite 6.14 packages that fixes Important security bugs and several\nregular bugs are now available for Red Hat Satellite.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Satellite is a system management solution that allows organizations\nto configure and maintain their systems without the necessity to provide\npublic Internet access to their servers or other client systems. It\nperforms provisioning and configuration management of predefined standard\noperating environments.\n\nSecurity fix(es):\n\n* rubygem-actionpack: actionpack: Possible XSS via User Supplied Values to redirect_to [rhn_satellite_6.14] (CVE-2023-28362)\n\n* foreman: World readable file containing secrets [rhn_satellite_6.14] (CVE-2023-4886)\n\n* python-urllib3: urllib3: Request body not stripped after redirect from 303 status changes request method to GET [rhn_satellite_6-default] (CVE-2023-45803 )\n\n* python-gitpython: GitPython: Blind local file inclusion [rhn_satellite_6-default] (CVE-2023-41040)\n\nThis update fixes the following bugs:\n\n2250342 - REX job finished with exit code 0 but the script failed on client side due to no space.\n2250343 - Selinux denials are reported after following \"Chapter 13. Managing Custom File Type Content\" chapter step by step\n2250344 - Long running postgres threads during content-export\n2250345 - Upgrade django-import-export package to at least 3.1.0\n2250349 - After upstream repo switched to zst compression, Satellite 6.12.5.1 unable to sync\n2250350 - Slow generate applicability for Hosts with multiple modulestreams installed\n2250352 - Recalculate button for Errata is not available on Satellite 6.13/ Satellite 6.14 if no errata is present\n2250351 - Actions::ForemanLeapp::PreupgradeJob fails with null value in column \"preupgrade_report_id\" violates not-null constraint when run with non-admin user\n2251799 - REX Template for \u0027convert2rhel analyze\u0027 command\n2254085 - Getting \u0027/usr/sbin/foreman-rake db:migrate\u0027 returned 1 instead of one of [0] ERROR while trying to upgrade Satellite 6.13 to 6.14 \n2254080 - satellite-convert2rhel-toolkit rpm v1.0.0 in 6.14.z\n\nUsers of Red Hat Satellite are advised to upgrade to these updated\npackages, which fix these bugs.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7851",
"url": "https://access.redhat.com/errata/RHSA-2023:7851"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_satellite/6.14/html/upgrading_red_hat_satellite_to_6.14/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_satellite/6.14/html/upgrading_red_hat_satellite_to_6.14/index"
},
{
"category": "external",
"summary": "2217785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217785"
},
{
"category": "external",
"summary": "2230135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230135"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "2247040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247040"
},
{
"category": "external",
"summary": "2250342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250342"
},
{
"category": "external",
"summary": "2250343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250343"
},
{
"category": "external",
"summary": "2250344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250344"
},
{
"category": "external",
"summary": "2250345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250345"
},
{
"category": "external",
"summary": "2250349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250349"
},
{
"category": "external",
"summary": "2250350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250350"
},
{
"category": "external",
"summary": "2250351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250351"
},
{
"category": "external",
"summary": "2250352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250352"
},
{
"category": "external",
"summary": "2251799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251799"
},
{
"category": "external",
"summary": "2254080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254080"
},
{
"category": "external",
"summary": "2254085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254085"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7851.json"
}
],
"title": "Red Hat Security Advisory: Satellite 6.14.1 Async Security Update",
"tracking": {
"current_release_date": "2024-11-23T03:39:40+00:00",
"generator": {
"date": "2024-11-23T03:39:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:7851",
"initial_release_date": "2023-12-14T16:30:08+00:00",
"revision_history": [
{
"date": "2023-12-14T16:30:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-12-14T16:30:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-23T03:39:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 6.14 for RHEL 8",
"product": {
"name": "Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:satellite:6.14::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 6.14 for RHEL 8",
"product": {
"name": "Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:satellite_capsule:6.14::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 6.14 for RHEL 8",
"product": {
"name": "Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:satellite_utils:6.14::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite 6"
},
{
"branches": [
{
"category": "product_version",
"name": "createrepo_c-0:1.0.2-2.el8pc.src",
"product": {
"name": "createrepo_c-0:1.0.2-2.el8pc.src",
"product_id": "createrepo_c-0:1.0.2-2.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/createrepo_c@1.0.2-2.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "foreman-0:3.7.0.10-1.el8sat.src",
"product": {
"name": "foreman-0:3.7.0.10-1.el8sat.src",
"product_id": "foreman-0:3.7.0.10-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman@3.7.0.10-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "foreman-installer-1:3.7.0.5-1.el8sat.src",
"product": {
"name": "foreman-installer-1:3.7.0.5-1.el8sat.src",
"product_id": "foreman-installer-1:3.7.0.5-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-installer@3.7.0.5-1.el8sat?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-django-import-export-0:3.1.0-1.el8pc.src",
"product": {
"name": "python-django-import-export-0:3.1.0-1.el8pc.src",
"product_id": "python-django-import-export-0:3.1.0-1.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-django-import-export@3.1.0-1.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-gitpython-0:3.1.40-0.1.el8pc.src",
"product": {
"name": "python-gitpython-0:3.1.40-0.1.el8pc.src",
"product_id": "python-gitpython-0:3.1.40-0.1.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-gitpython@3.1.40-0.1.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pulpcore-0:3.22.19-1.el8pc.src",
"product": {
"name": "python-pulpcore-0:3.22.19-1.el8pc.src",
"product_id": "python-pulpcore-0:3.22.19-1.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pulpcore@3.22.19-1.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pulp-rpm-0:3.19.11-2.el8pc.src",
"product": {
"name": "python-pulp-rpm-0:3.19.11-2.el8pc.src",
"product_id": "python-pulp-rpm-0:3.19.11-2.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pulp-rpm@3.19.11-2.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.26.18-0.1.el8pc.src",
"product": {
"name": "python-urllib3-0:1.26.18-0.1.el8pc.src",
"product_id": "python-urllib3-0:1.26.18-0.1.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.26.18-0.1.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actioncable@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionmailbox@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionmailer@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionpack@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actiontext@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionview@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activejob@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activemodel@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activerecord@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activestorage@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activesupport@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-rails-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-rails-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-rails-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rails@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-railties-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-railties-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-railties-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-railties@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"product": {
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"product_id": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-smart_proxy_remote_execution_ssh@0.10.2-2.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "satellite-0:6.14.1-1.el8sat.src",
"product": {
"name": "satellite-0:6.14.1-1.el8sat.src",
"product_id": "satellite-0:6.14.1-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite@6.14.1-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"product": {
"name": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"product_id": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-foreman_remote_execution@10.1.2-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-katello-0:4.9.0.18-1.el8sat.src",
"product": {
"name": "rubygem-katello-0:4.9.0.18-1.el8sat.src",
"product_id": "rubygem-katello-0:4.9.0.18-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-katello@4.9.0.18-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.src",
"product": {
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.src",
"product_id": "pulpcore-selinux-0:2.0.0-1.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pulpcore-selinux@2.0.0-1.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"product": {
"name": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"product_id": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-foreman_leapp@1.1.0-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"product": {
"name": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"product_id": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite-convert2rhel-toolkit@1.0.0-1.el8sat?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product_id": "createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/createrepo_c@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"product_id": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/createrepo_c-libs@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product_id": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-createrepo_c@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product_id": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-createrepo_c@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"product_id": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/createrepo_c-debugsource@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_id": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/createrepo_c-debuginfo@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_id": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/createrepo_c-libs-debuginfo@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_id": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-createrepo_c-debuginfo@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_id": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-createrepo_c-debuginfo@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"product": {
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"product_id": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pulpcore-selinux@2.0.0-1.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64",
"product": {
"name": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64",
"product_id": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite-convert2rhel-toolkit@1.0.0-1.el8sat?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-cli@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-debug@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-dynflow-sidekiq@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-ec2@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-journald@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-libvirt@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-openstack@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-ovirt@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-postgresql@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-redis@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-service-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-service-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-service-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-service@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-telemetry@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-vmware@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"product": {
"name": "foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"product_id": "foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-installer@3.7.0.5-1.el8sat?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"product": {
"name": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"product_id": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-installer-katello@3.7.0.5-1.el8sat?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"product": {
"name": "python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"product_id": "python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-django-import-export@3.1.0-1.el8pc?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"product": {
"name": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"product_id": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-gitpython@3.1.40-0.1.el8pc?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"product": {
"name": "python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"product_id": "python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pulpcore@3.22.19-1.el8pc?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"product": {
"name": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"product_id": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pulp-rpm@3.19.11-2.el8pc?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"product": {
"name": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"product_id": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-urllib3@1.26.18-0.1.el8pc?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actioncable@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionmailbox@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionmailer@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionpack@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actiontext@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionview@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activejob@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activemodel@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activerecord@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activestorage@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activesupport@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rails@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-railties@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"product": {
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"product_id": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-smart_proxy_remote_execution_ssh@0.10.2-2.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "satellite-cli-0:6.14.1-1.el8sat.noarch",
"product": {
"name": "satellite-cli-0:6.14.1-1.el8sat.noarch",
"product_id": "satellite-cli-0:6.14.1-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite-cli@6.14.1-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "satellite-capsule-0:6.14.1-1.el8sat.noarch",
"product": {
"name": "satellite-capsule-0:6.14.1-1.el8sat.noarch",
"product_id": "satellite-capsule-0:6.14.1-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite-capsule@6.14.1-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "satellite-common-0:6.14.1-1.el8sat.noarch",
"product": {
"name": "satellite-common-0:6.14.1-1.el8sat.noarch",
"product_id": "satellite-common-0:6.14.1-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite-common@6.14.1-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "satellite-0:6.14.1-1.el8sat.noarch",
"product": {
"name": "satellite-0:6.14.1-1.el8sat.noarch",
"product_id": "satellite-0:6.14.1-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite@6.14.1-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"product": {
"name": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"product_id": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-foreman_remote_execution@10.1.2-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"product": {
"name": "rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"product_id": "rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-foreman_remote_execution-cockpit@10.1.2-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"product": {
"name": "rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"product_id": "rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-katello@4.9.0.18-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"product": {
"name": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"product_id": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-foreman_leapp@1.1.0-1.el8sat?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-0:1.0.2-2.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src"
},
"product_reference": "createrepo_c-0:1.0.2-2.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-0:3.7.0.10-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src"
},
"product_reference": "foreman-0:3.7.0.10-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-cli-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-debug-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-installer-1:3.7.0.5-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch"
},
"product_reference": "foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-installer-1:3.7.0.5-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src"
},
"product_reference": "foreman-installer-1:3.7.0.5-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch"
},
"product_reference": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-journald-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-redis-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-service-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-service-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src"
},
"product_reference": "pulpcore-selinux-0:2.0.0-1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64"
},
"product_reference": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-django-import-export-0:3.1.0-1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src"
},
"product_reference": "python-django-import-export-0:3.1.0-1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gitpython-0:3.1.40-0.1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src"
},
"product_reference": "python-gitpython-0:3.1.40-0.1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pulp-rpm-0:3.19.11-2.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src"
},
"product_reference": "python-pulp-rpm-0:3.19.11-2.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pulpcore-0:3.22.19-1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src"
},
"product_reference": "python-pulpcore-0:3.22.19-1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.26.18-0.1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src"
},
"product_reference": "python-urllib3-0:1.26.18-0.1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-django-import-export-0:3.1.0-1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch"
},
"product_reference": "python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch"
},
"product_reference": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch"
},
"product_reference": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pulpcore-0:3.22.19-1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch"
},
"product_reference": "python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch"
},
"product_reference": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch"
},
"product_reference": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src"
},
"product_reference": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-0:6.14.1-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src"
},
"product_reference": "satellite-0:6.14.1-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-capsule-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-capsule-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-cli-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-cli-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-common-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-common-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-0:3.7.0.10-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src"
},
"product_reference": "foreman-0:3.7.0.10-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-cli-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-debug-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-journald-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-redis-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-service-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-service-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-0:6.14.1-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src"
},
"product_reference": "satellite-0:6.14.1-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-capsule-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-capsule-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-cli-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-cli-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-common-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-common-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-0:1.0.2-2.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src"
},
"product_reference": "createrepo_c-0:1.0.2-2.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-0:3.7.0.10-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src"
},
"product_reference": "foreman-0:3.7.0.10-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-cli-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-debug-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-installer-1:3.7.0.5-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch"
},
"product_reference": "foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-installer-1:3.7.0.5-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src"
},
"product_reference": "foreman-installer-1:3.7.0.5-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch"
},
"product_reference": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-journald-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-redis-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-service-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-service-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src"
},
"product_reference": "pulpcore-selinux-0:2.0.0-1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64"
},
"product_reference": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-django-import-export-0:3.1.0-1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src"
},
"product_reference": "python-django-import-export-0:3.1.0-1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gitpython-0:3.1.40-0.1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src"
},
"product_reference": "python-gitpython-0:3.1.40-0.1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pulp-rpm-0:3.19.11-2.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src"
},
"product_reference": "python-pulp-rpm-0:3.19.11-2.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pulpcore-0:3.22.19-1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src"
},
"product_reference": "python-pulpcore-0:3.22.19-1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.26.18-0.1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src"
},
"product_reference": "python-urllib3-0:1.26.18-0.1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-django-import-export-0:3.1.0-1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch"
},
"product_reference": "python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch"
},
"product_reference": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch"
},
"product_reference": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pulpcore-0:3.22.19-1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch"
},
"product_reference": "python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch"
},
"product_reference": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actioncable-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionpack-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actiontext-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionview-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionview-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activejob-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activejob-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activemodel-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activerecord-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activestorage-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activesupport-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch"
},
"product_reference": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src"
},
"product_reference": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch"
},
"product_reference": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src"
},
"product_reference": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch"
},
"product_reference": "rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-katello-0:4.9.0.18-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch"
},
"product_reference": "rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-katello-0:4.9.0.18-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src"
},
"product_reference": "rubygem-katello-0:4.9.0.18-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rails-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rails-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-rails-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-railties-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-railties-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-railties-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch"
},
"product_reference": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src"
},
"product_reference": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-0:6.14.1-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src"
},
"product_reference": "satellite-0:6.14.1-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-capsule-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-capsule-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-cli-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-cli-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-common-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-common-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src"
},
"product_reference": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
},
"product_reference": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-4886",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-08-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230135"
}
],
"notes": [
{
"category": "description",
"text": "A sensitive information exposure vulnerability was found in foreman. Contents of tomcat\u0027s server.xml file, which contain passwords to candlepin\u0027s keystore and truststore, were found to be world readable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "foreman: World readable file containing secrets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has a limited impact on security, as candlepin\u0027s individual stores\u0027 privileges are limited to root and tomcat only. Therefore, the impact is limited to highly privileged users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch"
],
"known_not_affected": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-4886"
},
{
"category": "external",
"summary": "RHBZ#2230135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-4886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-4886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4886"
}
],
"release_date": "2023-10-03T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-14T16:30:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7851"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "foreman: World readable file containing secrets"
},
{
"cve": "CVE-2023-28362",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-06-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2217785"
}
],
"notes": [
{
"category": "description",
"text": "A Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "actionpack: Possible XSS via User Supplied Values to redirect_to",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src"
],
"known_not_affected": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28362"
},
{
"category": "external",
"summary": "RHBZ#2217785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217785"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28362"
},
{
"category": "external",
"summary": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-28362.yml",
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-28362.yml"
}
],
"release_date": "2023-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-14T16:30:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7851"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "actionpack: Possible XSS via User Supplied Values to redirect_to"
},
{
"cve": "CVE-2023-41040",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2023-10-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2247040"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal vulnerability was found in GitPython due to an input validation error when reading from the \".git\" directory. This issue may allow a remote attacker to prepare a specially crafted \".git\" file with directory traversal characters in file names and force the application to read these files from the local system, which can result in checking for the existence of a specific file on the system or allow a denial of service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GitPython: Blind local file inclusion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability cannot be used to read the contents of files but could be used to trigger a denial of service for the program.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch"
],
"known_not_affected": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41040"
},
{
"category": "external",
"summary": "RHBZ#2247040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247040"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41040"
},
{
"category": "external",
"summary": "https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c",
"url": "https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c"
}
],
"release_date": "2023-08-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-14T16:30:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7851"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GitPython: Blind local file inclusion"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-14T16:30:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch"
],
"known_not_affected": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-14T16:30:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7851"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2024_0588
Vulnerability from csaf_redhat - Published: 2024-01-30 13:27 - Updated: 2024-11-14 00:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-urllib3 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0588",
"url": "https://access.redhat.com/errata/RHSA-2024:0588"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0588.json"
}
],
"title": "Red Hat Security Advisory: python-urllib3 security update",
"tracking": {
"current_release_date": "2024-11-14T00:21:56+00:00",
"generator": {
"date": "2024-11-14T00:21:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:0588",
"initial_release_date": "2024-01-30T13:27:51+00:00",
"revision_history": [
{
"date": "2024-01-30T13:27:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T13:27:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T00:21:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-0:1.24.2-5.el8_8.1.src",
"product": {
"name": "python-urllib3-0:1.24.2-5.el8_8.1.src",
"product_id": "python-urllib3-0:1.24.2-5.el8_8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.24.2-5.el8_8.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-urllib3-0:1.24.2-5.el8_8.1.noarch",
"product": {
"name": "python3-urllib3-0:1.24.2-5.el8_8.1.noarch",
"product_id": "python3-urllib3-0:1.24.2-5.el8_8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-urllib3@1.24.2-5.el8_8.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.24.2-5.el8_8.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src"
},
"product_reference": "python-urllib3-0:1.24.2-5.el8_8.1.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-0:1.24.2-5.el8_8.1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
},
"product_reference": "python3-urllib3-0:1.24.2-5.el8_8.1.noarch",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T13:27:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0588"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T13:27:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0588"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2024_1383
Vulnerability from csaf_redhat - Published: 2024-03-19 15:19 - Updated: 2024-12-17 22:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that include numerous enhancements and bug fixes are now available for Red Hat OpenShift Data Foundation 4.15.0 on Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThese updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_data_foundation/4.15/html/4.15_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these packages that provide these bug fixes and enhancements.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1383",
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_data_foundation/4.15/html/4.15_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_data_foundation/4.15/html/4.15_release_notes/index"
},
{
"category": "external",
"summary": "2005835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005835"
},
{
"category": "external",
"summary": "2022467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022467"
},
{
"category": "external",
"summary": "2126028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126028"
},
{
"category": "external",
"summary": "2130266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130266"
},
{
"category": "external",
"summary": "2151493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151493"
},
{
"category": "external",
"summary": "2165128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165128"
},
{
"category": "external",
"summary": "2165907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165907"
},
{
"category": "external",
"summary": "2196858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196858"
},
{
"category": "external",
"summary": "2207925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207925"
},
{
"category": "external",
"summary": "2208302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2208302"
},
{
"category": "external",
"summary": "2209616",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209616"
},
{
"category": "external",
"summary": "2210970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210970"
},
{
"category": "external",
"summary": "2213885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213885"
},
{
"category": "external",
"summary": "2222254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222254"
},
{
"category": "external",
"summary": "2228785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228785"
},
{
"category": "external",
"summary": "2229670",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229670"
},
{
"category": "external",
"summary": "2231076",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231076"
},
{
"category": "external",
"summary": "2231860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231860"
},
{
"category": "external",
"summary": "2233010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233010"
},
{
"category": "external",
"summary": "2234479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234479"
},
{
"category": "external",
"summary": "2236384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236384"
},
{
"category": "external",
"summary": "2236400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236400"
},
{
"category": "external",
"summary": "2237427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237427"
},
{
"category": "external",
"summary": "2237895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237895"
},
{
"category": "external",
"summary": "2237903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237903"
},
{
"category": "external",
"summary": "2237920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237920"
},
{
"category": "external",
"summary": "2239208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239208"
},
{
"category": "external",
"summary": "2239590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239590"
},
{
"category": "external",
"summary": "2239608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239608"
},
{
"category": "external",
"summary": "2240756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240756"
},
{
"category": "external",
"summary": "2240908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240908"
},
{
"category": "external",
"summary": "2241268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241268"
},
{
"category": "external",
"summary": "2241872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241872"
},
{
"category": "external",
"summary": "2242309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242309"
},
{
"category": "external",
"summary": "2244568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244568"
},
{
"category": "external",
"summary": "2244569",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244569"
},
{
"category": "external",
"summary": "2244570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244570"
},
{
"category": "external",
"summary": "2245004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245004"
},
{
"category": "external",
"summary": "2246084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246084"
},
{
"category": "external",
"summary": "2246993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246993"
},
{
"category": "external",
"summary": "2247094",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247094"
},
{
"category": "external",
"summary": "2247313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247313"
},
{
"category": "external",
"summary": "2247518",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247518"
},
{
"category": "external",
"summary": "2247542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247542"
},
{
"category": "external",
"summary": "2247714",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247714"
},
{
"category": "external",
"summary": "2247731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247731"
},
{
"category": "external",
"summary": "2247743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247743"
},
{
"category": "external",
"summary": "2247748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247748"
},
{
"category": "external",
"summary": "2248117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248117"
},
{
"category": "external",
"summary": "2248664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248664"
},
{
"category": "external",
"summary": "2248666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248666"
},
{
"category": "external",
"summary": "2248684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248684"
},
{
"category": "external",
"summary": "2248832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248832"
},
{
"category": "external",
"summary": "2249678",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249678"
},
{
"category": "external",
"summary": "2249844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249844"
},
{
"category": "external",
"summary": "2250092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250092"
},
{
"category": "external",
"summary": "2250152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250152"
},
{
"category": "external",
"summary": "2250636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250636"
},
{
"category": "external",
"summary": "2250911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250911"
},
{
"category": "external",
"summary": "2250995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250995"
},
{
"category": "external",
"summary": "2251741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251741"
},
{
"category": "external",
"summary": "2252035",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252035"
},
{
"category": "external",
"summary": "2252756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252756"
},
{
"category": "external",
"summary": "2253185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253185"
},
{
"category": "external",
"summary": "2253257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253257"
},
{
"category": "external",
"summary": "2253953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253953"
},
{
"category": "external",
"summary": "2254159",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254159"
},
{
"category": "external",
"summary": "2254216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254216"
},
{
"category": "external",
"summary": "2254330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254330"
},
{
"category": "external",
"summary": "2254333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254333"
},
{
"category": "external",
"summary": "2254513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254513"
},
{
"category": "external",
"summary": "2255036",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255036"
},
{
"category": "external",
"summary": "2255194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255194"
},
{
"category": "external",
"summary": "2255219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255219"
},
{
"category": "external",
"summary": "2255232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255232"
},
{
"category": "external",
"summary": "2255240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255240"
},
{
"category": "external",
"summary": "2255241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255241"
},
{
"category": "external",
"summary": "2255310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255310"
},
{
"category": "external",
"summary": "2255320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255320"
},
{
"category": "external",
"summary": "2255328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255328"
},
{
"category": "external",
"summary": "2255332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255332"
},
{
"category": "external",
"summary": "2255333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255333"
},
{
"category": "external",
"summary": "2255340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255340"
},
{
"category": "external",
"summary": "2255343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255343"
},
{
"category": "external",
"summary": "2255411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255411"
},
{
"category": "external",
"summary": "2255491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255491"
},
{
"category": "external",
"summary": "2255499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255499"
},
{
"category": "external",
"summary": "2255501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255501"
},
{
"category": "external",
"summary": "2255508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255508"
},
{
"category": "external",
"summary": "2255557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255557"
},
{
"category": "external",
"summary": "2255586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255586"
},
{
"category": "external",
"summary": "2255890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255890"
},
{
"category": "external",
"summary": "2256085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256085"
},
{
"category": "external",
"summary": "2256161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256161"
},
{
"category": "external",
"summary": "2256456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256456"
},
{
"category": "external",
"summary": "2256566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256566"
},
{
"category": "external",
"summary": "2256580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256580"
},
{
"category": "external",
"summary": "2256597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256597"
},
{
"category": "external",
"summary": "2256633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256633"
},
{
"category": "external",
"summary": "2256637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256637"
},
{
"category": "external",
"summary": "2256725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256725"
},
{
"category": "external",
"summary": "2256777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256777"
},
{
"category": "external",
"summary": "2257222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257222"
},
{
"category": "external",
"summary": "2257296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257296"
},
{
"category": "external",
"summary": "2257310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257310"
},
{
"category": "external",
"summary": "2257427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257427"
},
{
"category": "external",
"summary": "2257441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257441"
},
{
"category": "external",
"summary": "2257634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257634"
},
{
"category": "external",
"summary": "2257674",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257674"
},
{
"category": "external",
"summary": "2257694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257694"
},
{
"category": "external",
"summary": "2257711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257711"
},
{
"category": "external",
"summary": "2257982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257982"
},
{
"category": "external",
"summary": "2258015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258015"
},
{
"category": "external",
"summary": "2258021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258021"
},
{
"category": "external",
"summary": "2258351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258351"
},
{
"category": "external",
"summary": "2258357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258357"
},
{
"category": "external",
"summary": "2258560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258560"
},
{
"category": "external",
"summary": "2258591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258591"
},
{
"category": "external",
"summary": "2258681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258681"
},
{
"category": "external",
"summary": "2258744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258744"
},
{
"category": "external",
"summary": "2258814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258814"
},
{
"category": "external",
"summary": "2258937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258937"
},
{
"category": "external",
"summary": "2258974",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258974"
},
{
"category": "external",
"summary": "2259187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259187"
},
{
"category": "external",
"summary": "2259476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259476"
},
{
"category": "external",
"summary": "2259632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259632"
},
{
"category": "external",
"summary": "2259664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259664"
},
{
"category": "external",
"summary": "2259773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259773"
},
{
"category": "external",
"summary": "2259852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259852"
},
{
"category": "external",
"summary": "2260050",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260050"
},
{
"category": "external",
"summary": "2260131",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260131"
},
{
"category": "external",
"summary": "2260279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260279"
},
{
"category": "external",
"summary": "2260340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260340"
},
{
"category": "external",
"summary": "2260818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260818"
},
{
"category": "external",
"summary": "2261936",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261936"
},
{
"category": "external",
"summary": "2262052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262052"
},
{
"category": "external",
"summary": "2262252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262252"
},
{
"category": "external",
"summary": "2262376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262376"
},
{
"category": "external",
"summary": "2262974",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262974"
},
{
"category": "external",
"summary": "2263319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263319"
},
{
"category": "external",
"summary": "2263472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263472"
},
{
"category": "external",
"summary": "2263984",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263984"
},
{
"category": "external",
"summary": "2264002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264002"
},
{
"category": "external",
"summary": "2264825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264825"
},
{
"category": "external",
"summary": "2265051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265051"
},
{
"category": "external",
"summary": "2265109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265109"
},
{
"category": "external",
"summary": "2265124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265124"
},
{
"category": "external",
"summary": "2265514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265514"
},
{
"category": "external",
"summary": "2266564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266564"
},
{
"category": "external",
"summary": "2266583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266583"
},
{
"category": "external",
"summary": "2267209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267209"
},
{
"category": "external",
"summary": "2267712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267712"
},
{
"category": "external",
"summary": "2267857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267857"
},
{
"category": "external",
"summary": "2267885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267885"
},
{
"category": "external",
"summary": "2268407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268407"
},
{
"category": "external",
"summary": "2268959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268959"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1383.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.15.0 security, enhancement, \u0026 bug fix update",
"tracking": {
"current_release_date": "2024-12-17T22:35:50+00:00",
"generator": {
"date": "2024-12-17T22:35:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:1383",
"initial_release_date": "2024-03-19T15:19:34+00:00",
"revision_history": [
{
"date": "2024-03-19T15:19:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:19:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T22:35:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHODF 4.15 for RHEL 9",
"product": {
"name": "RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_data_foundation:4.15::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Data Foundation"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"product": {
"name": "odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"product_id": "odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2?arch=s390x\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel9\u0026tag=v4.15.0-37"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"product": {
"name": "odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"product_id": "odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel9\u0026tag=v4.15.0-68"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"product": {
"name": "odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"product_id": "odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"product": {
"name": "odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"product_id": "odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-rhel9-operator\u0026tag=v4.15.0-39"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"product": {
"name": "odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"product_id": "odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-client-console-rhel9\u0026tag=v4.15.0-58"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"product": {
"name": "odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"product_id": "odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-client-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"product": {
"name": "odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"product_id": "odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-client-rhel9-operator\u0026tag=v4.15.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"product": {
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"product_id": "odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-metrics-exporter-rhel9\u0026tag=v4.15.0-81"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"product": {
"name": "odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"product_id": "odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"product": {
"name": "odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"product_id": "odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-rhel9-operator\u0026tag=v4.15.0-79"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"product": {
"name": "odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"product_id": "odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-cli-rhel9\u0026tag=v4.15.0-22"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"product": {
"name": "odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"product_id": "odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel9\u0026tag=v4.15.0-57"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"product": {
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"product_id": "odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-cosi-sidecar-rhel9\u0026tag=v4.15.0-6"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"product": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"product_id": "odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"product": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"product_id": "odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel9-operator\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"product_id": "odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel9\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"product": {
"name": "odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"product_id": "odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-console-rhel9\u0026tag=v4.15.0-54"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"product": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"product_id": "odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"product": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"product_id": "odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel9-operator\u0026tag=v4.15.0-10"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"product": {
"name": "odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"product_id": "odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-must-gather-rhel9\u0026tag=v4.15.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"product": {
"name": "odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"product_id": "odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"product": {
"name": "odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"product_id": "odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-rhel9-operator\u0026tag=v4.15.0-19"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"product": {
"name": "odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"product_id": "odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"product": {
"name": "odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"product_id": "odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"product": {
"name": "odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"product_id": "odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-rhel9-operator\u0026tag=v4.15.0-21"
}
}
},
{
"category": "product_version",
"name": "odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"product": {
"name": "odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"product_id": "odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0?arch=s390x\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel9-operator\u0026tag=v4.15.0-103"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"product": {
"name": "odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"product_id": "odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14?arch=amd64\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel9\u0026tag=v4.15.0-37"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"product": {
"name": "odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"product_id": "odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel9\u0026tag=v4.15.0-68"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"product": {
"name": "odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"product_id": "odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"product": {
"name": "odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"product_id": "odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-rhel9-operator\u0026tag=v4.15.0-39"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"product": {
"name": "odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"product_id": "odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-client-console-rhel9\u0026tag=v4.15.0-58"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"product": {
"name": "odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"product_id": "odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-client-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"product": {
"name": "odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"product_id": "odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-client-rhel9-operator\u0026tag=v4.15.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"product": {
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"product_id": "odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-metrics-exporter-rhel9\u0026tag=v4.15.0-81"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"product": {
"name": "odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"product_id": "odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"product": {
"name": "odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"product_id": "odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel9-operator\u0026tag=v4.15.0-79"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"product": {
"name": "odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"product_id": "odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-cli-rhel9\u0026tag=v4.15.0-22"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"product": {
"name": "odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"product_id": "odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel9\u0026tag=v4.15.0-57"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"product": {
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"product_id": "odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-cosi-sidecar-rhel9\u0026tag=v4.15.0-6"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"product": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"product_id": "odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"product": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"product_id": "odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel9-operator\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"product_id": "odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel9\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"product": {
"name": "odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"product_id": "odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-console-rhel9\u0026tag=v4.15.0-54"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"product": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"product_id": "odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"product": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"product_id": "odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel9-operator\u0026tag=v4.15.0-10"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"product": {
"name": "odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"product_id": "odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-must-gather-rhel9\u0026tag=v4.15.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"product": {
"name": "odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"product_id": "odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"product": {
"name": "odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"product_id": "odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-rhel9-operator\u0026tag=v4.15.0-19"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"product": {
"name": "odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"product_id": "odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"product": {
"name": "odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"product_id": "odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"product": {
"name": "odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"product_id": "odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-rhel9-operator\u0026tag=v4.15.0-21"
}
}
},
{
"category": "product_version",
"name": "odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64",
"product": {
"name": "odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64",
"product_id": "odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a?arch=amd64\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel9-operator\u0026tag=v4.15.0-103"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"product": {
"name": "odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"product_id": "odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel9\u0026tag=v4.15.0-37"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"product": {
"name": "odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"product_id": "odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel9\u0026tag=v4.15.0-68"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"product": {
"name": "odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"product_id": "odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"product": {
"name": "odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"product_id": "odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-rhel9-operator\u0026tag=v4.15.0-39"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"product": {
"name": "odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"product_id": "odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-client-console-rhel9\u0026tag=v4.15.0-58"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"product": {
"name": "odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"product_id": "odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-client-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"product": {
"name": "odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"product_id": "odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-client-rhel9-operator\u0026tag=v4.15.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"product": {
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"product_id": "odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-metrics-exporter-rhel9\u0026tag=v4.15.0-81"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"product": {
"name": "odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"product_id": "odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"product": {
"name": "odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"product_id": "odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-rhel9-operator\u0026tag=v4.15.0-79"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"product": {
"name": "odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"product_id": "odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-cli-rhel9\u0026tag=v4.15.0-22"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"product": {
"name": "odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"product_id": "odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel9\u0026tag=v4.15.0-57"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"product": {
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"product_id": "odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-cosi-sidecar-rhel9\u0026tag=v4.15.0-6"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"product": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"product_id": "odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"product": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"product_id": "odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel9-operator\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"product_id": "odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel9\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"product": {
"name": "odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"product_id": "odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-console-rhel9\u0026tag=v4.15.0-54"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"product": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"product_id": "odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"product": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"product_id": "odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel9-operator\u0026tag=v4.15.0-10"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"product": {
"name": "odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"product_id": "odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-must-gather-rhel9\u0026tag=v4.15.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"product": {
"name": "odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"product_id": "odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"product": {
"name": "odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"product_id": "odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-rhel9-operator\u0026tag=v4.15.0-19"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"product": {
"name": "odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"product_id": "odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"product": {
"name": "odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"product_id": "odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"product": {
"name": "odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"product_id": "odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-rhel9-operator\u0026tag=v4.15.0-21"
}
}
},
{
"category": "product_version",
"name": "odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"product": {
"name": "odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"product_id": "odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel9-operator\u0026tag=v4.15.0-103"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"product": {
"name": "odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"product_id": "odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e?arch=arm64\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel9\u0026tag=v4.15.0-68"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"product": {
"name": "odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"product_id": "odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872?arch=arm64\u0026repository_url=registry.redhat.io/odf4/mcg-rhel9-operator\u0026tag=v4.15.0-39"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"product": {
"name": "odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"product_id": "odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708?arch=arm64\u0026repository_url=registry.redhat.io/odf4/ocs-client-rhel9-operator\u0026tag=v4.15.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"product": {
"name": "odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"product_id": "odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198?arch=arm64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel9-operator\u0026tag=v4.15.0-79"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"product": {
"name": "odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"product_id": "odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odf-cli-rhel9\u0026tag=v4.15.0-22"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"product": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"product_id": "odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel9-operator\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"product_id": "odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel9\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"product": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"product_id": "odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel9-operator\u0026tag=v4.15.0-10"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"product": {
"name": "odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"product_id": "odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odf-must-gather-rhel9\u0026tag=v4.15.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"product": {
"name": "odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"product_id": "odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odf-rhel9-operator\u0026tag=v4.15.0-19"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"product": {
"name": "odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"product_id": "odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odr-rhel9-operator\u0026tag=v4.15.0-21"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64"
},
"product_reference": "odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x"
},
"product_reference": "odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
},
"product_reference": "odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64"
},
"product_reference": "odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x"
},
"product_reference": "odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le"
},
"product_reference": "odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64"
},
"product_reference": "odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64"
},
"product_reference": "odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x"
},
"product_reference": "odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le"
},
"product_reference": "odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64"
},
"product_reference": "odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le"
},
"product_reference": "odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64"
},
"product_reference": "odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x"
},
"product_reference": "odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64"
},
"product_reference": "odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le"
},
"product_reference": "odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x"
},
"product_reference": "odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x"
},
"product_reference": "odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64"
},
"product_reference": "odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le"
},
"product_reference": "odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64"
},
"product_reference": "odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x"
},
"product_reference": "odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64"
},
"product_reference": "odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le"
},
"product_reference": "odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x"
},
"product_reference": "odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le"
},
"product_reference": "odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64"
},
"product_reference": "odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le"
},
"product_reference": "odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64"
},
"product_reference": "odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x"
},
"product_reference": "odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le"
},
"product_reference": "odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x"
},
"product_reference": "odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64"
},
"product_reference": "odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64"
},
"product_reference": "odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64"
},
"product_reference": "odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le"
},
"product_reference": "odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x"
},
"product_reference": "odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64"
},
"product_reference": "odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x"
},
"product_reference": "odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64"
},
"product_reference": "odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le"
},
"product_reference": "odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x"
},
"product_reference": "odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64"
},
"product_reference": "odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le"
},
"product_reference": "odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64"
},
"product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le"
},
"product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x"
},
"product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64"
},
"product_reference": "odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le"
},
"product_reference": "odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64"
},
"product_reference": "odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x"
},
"product_reference": "odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le"
},
"product_reference": "odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64"
},
"product_reference": "odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x"
},
"product_reference": "odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64"
},
"product_reference": "odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x"
},
"product_reference": "odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le"
},
"product_reference": "odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64"
},
"product_reference": "odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64"
},
"product_reference": "odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le"
},
"product_reference": "odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x"
},
"product_reference": "odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x"
},
"product_reference": "odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64"
},
"product_reference": "odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le"
},
"product_reference": "odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64"
},
"product_reference": "odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le"
},
"product_reference": "odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64"
},
"product_reference": "odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x"
},
"product_reference": "odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x"
},
"product_reference": "odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le"
},
"product_reference": "odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64"
},
"product_reference": "odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64"
},
"product_reference": "odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64"
},
"product_reference": "odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x"
},
"product_reference": "odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le"
},
"product_reference": "odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64"
},
"product_reference": "odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x"
},
"product_reference": "odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le"
},
"product_reference": "odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x"
},
"product_reference": "odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le"
},
"product_reference": "odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64"
},
"product_reference": "odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64"
},
"product_reference": "odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le"
},
"product_reference": "odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x"
},
"product_reference": "odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
},
"product_reference": "odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-35937",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2021-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964125"
}
],
"notes": [
{
"category": "description",
"text": "A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: TOCTOU race in checks for unsafe symlinks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "System and service accounts may have the required permissions to exploit this flaw. Conversely, regular user accounts should not be allowed to manipulate RPM artifacts during installation, thus reducing the attack surface and hence the impact of this flaw considerably.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-35937"
},
{
"category": "external",
"summary": "RHBZ#1964125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35937"
}
],
"release_date": "2021-06-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: TOCTOU race in checks for unsafe symlinks"
},
{
"cve": "CVE-2021-35938",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2021-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964114"
}
],
"notes": [
{
"category": "description",
"text": "A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: races with chown/chmod/capabilities calls during installation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "System and service accounts may have the required permissions to exploit this flaw. Conversely, regular user accounts should not be allowed to manipulate RPM artifacts during installation, thus reducing the attack surface and hence the impact of this flaw considerably.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-35938"
},
{
"category": "external",
"summary": "RHBZ#1964114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35938"
},
{
"category": "external",
"summary": "https://rpm.org/wiki/Releases/4.18.0",
"url": "https://rpm.org/wiki/Releases/4.18.0"
}
],
"release_date": "2021-06-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: races with chown/chmod/capabilities calls during installation"
},
{
"cve": "CVE-2021-35939",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2021-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964129"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: checks for unsafe symlinks are not performed for intermediary directories",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "System and service accounts may have the required permissions to exploit this flaw. Conversely, regular user accounts should not be allowed to manipulate RPM artifacts during installation, thus reducing the attack surface and hence the impact of this flaw considerably.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-35939"
},
{
"category": "external",
"summary": "RHBZ#1964129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35939"
},
{
"category": "external",
"summary": "https://rpm.org/wiki/Releases/4.18.0",
"url": "https://rpm.org/wiki/Releases/4.18.0"
}
],
"release_date": "2021-06-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: checks for unsafe symlinks are not performed for intermediary directories"
},
{
"cve": "CVE-2023-3462",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2023-08-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228020"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the HashiCorp Vault. The Vault and Vault Enterprise (\u201cVault\u201d) LDAP auth method allows unauthenticated users to potentially enumerate valid accounts in the configured LDAP system by observing the response error when querying usernames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Hashicorp/vault: Vault\u2019s LDAP Auth Method Allows for User Enumeration",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3462"
},
{
"category": "external",
"summary": "RHBZ#2228020",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228020"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3462"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3462",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3462"
},
{
"category": "external",
"summary": "https://discuss.hashicorp.com/t/hcsec-2023-24-vaults-ldap-auth-method-allows-for-user-enumeration/56714",
"url": "https://discuss.hashicorp.com/t/hcsec-2023-24-vaults-ldap-auth-method-allows-for-user-enumeration/56714"
}
],
"release_date": "2023-07-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Hashicorp/vault: Vault\u2019s LDAP Auth Method Allows for User Enumeration"
},
{
"acknowledgments": [
{
"names": [
"Tony Battersby"
],
"organization": "Cybernetics",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2023-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243839"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL in how it processes key and initialization vector (IV) lengths. This issue can lead to potential truncation or overruns during the initialization of some symmetric ciphers. A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. Both truncations and overruns of the key and the IV will produce incorrect results and could, in some cases, trigger a memory exception.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Incorrect cipher key and IV length processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The identified bug in the processing of key and initialization vector (IV) lengths within certain symmetric cipher modes poses a moderate severity risk due to its potential impact on data confidentiality and integrity. While the truncation or overreading of key and IV lengths could lead to incorrect cryptographic operations and potential memory exceptions, the probability of exploitation is mitigated by several factors. Firstly, the affected API was recently introduced, limiting its widespread adoption. Secondly, altering key and IV lengths is not a common operation in most cryptographic implementations. Furthermore, the likelihood of vulnerability is reduced by the necessity for both communication peers to be similarly affected for decryption failures to occur, which would likely be detected during testing.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5363"
},
{
"category": "external",
"summary": "RHBZ#2243839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243839"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5363"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20231024.txt",
"url": "https://www.openssl.org/news/secadv/20231024.txt"
}
],
"release_date": "2023-10-24T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Incorrect cipher key and IV length processing"
},
{
"cve": "CVE-2023-5954",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2023-11-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2249115"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in The HashiCorp Vault, which may be susceptible to a denial of service due to an unbounded consumption of memory when handling policy requests. This issue may allow an attacker to trigger policy checks by sending multiple inbound client requests that create a logger that is never removed from memory, leading to excessive memory consumption, causing a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vault: inbound client requests can trigger a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5954"
},
{
"category": "external",
"summary": "RHBZ#2249115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5954"
},
{
"category": "external",
"summary": "https://discuss.hashicorp.com/t/hcsec-2023-33-vault-requests-triggering-policy-checks-may-lead-to-unbounded-memory-consumption/59926",
"url": "https://discuss.hashicorp.com/t/hcsec-2023-33-vault-requests-triggering-policy-checks-may-lead-to-unbounded-memory-consumption/59926"
}
],
"release_date": "2023-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vault: inbound client requests can trigger a denial of service"
},
{
"acknowledgments": [
{
"names": [
"Daiki Ueno"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-5981",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2023-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2248445"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: timing side-channel in the RSA-PSK authentication",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5981"
},
{
"category": "external",
"summary": "RHBZ#2248445",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248445"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5981",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5981"
},
{
"category": "external",
"summary": "https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23",
"url": "https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "To address the issue found upgrade to GnuTLS 3.8.2 or later versions.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: timing side-channel in the RSA-PSK authentication"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2023-12-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256194"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in SQLite3. This issue affects the sessionReadRecord function of the ext/session/sqlite3session.c function in the make alltest Handler component. Manipulation may cause a heap-based buffer overflow to occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: heap-buffer-overflow at sessionfuzz",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as having a moderate impact because it affects a non-critical component, lacks details on an easy exploitation method, and doesn\u0027t indicate severe impacts (such as remote code execution). So the risk is reduced by exploitation complexity and the absence of a clear and severe threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-7104"
},
{
"category": "external",
"summary": "RHBZ#2256194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-7104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-7104"
}
],
"release_date": "2023-12-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "sqlite: heap-buffer-overflow at sessionfuzz"
},
{
"cve": "CVE-2023-24532",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2023-07-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2223355"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/internal/nistec golang library. The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars, such as a scalar larger than the order of the curve. This does not impact usages of crypto/ecdsa or crypto/ecdh.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-24532"
},
{
"category": "external",
"summary": "RHBZ#2223355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223355"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24532",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24532"
},
{
"category": "external",
"summary": "https://go.dev/cl/471255",
"url": "https://go.dev/cl/471255"
},
{
"category": "external",
"summary": "https://go.dev/issue/58647",
"url": "https://go.dev/issue/58647"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/3-TpUx48iQY",
"url": "https://groups.google.com/g/golang-announce/c/3-TpUx48iQY"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-1621",
"url": "https://pkg.go.dev/vuln/GO-2023-1621"
}
],
"release_date": "2023-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results"
},
{
"cve": "CVE-2023-26159",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256413"
}
],
"notes": [
{
"category": "description",
"text": "An Improper Input Validation flaw was found in follow-redirects due to the improper handling of URLs by the url.parse() function. When a new URL() throws an error, it can be manipulated to misinterpret the hostname. This issue could allow an attacker to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "follow-redirects is a transitive dependency of Grafana, and does not affect Red Hat Enterprise Linux 8.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26159"
},
{
"category": "external",
"summary": "RHBZ#2256413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256413"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159"
}
],
"release_date": "2024-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()"
},
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2196183"
}
],
"notes": [
{
"category": "description",
"text": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-27043"
},
{
"category": "external",
"summary": "RHBZ#2196183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196183"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27043",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27043"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/7051467",
"url": "https://access.redhat.com/articles/7051467"
}
],
"release_date": "2023-04-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple"
},
{
"cve": "CVE-2023-28486",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2023-03-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2179272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sudo package, shipped with Red Hat Enterprise Linux 8 and 9, where sudo improperly escapes terminal control characters during logging operations. As sudo\u0027s log messages may contain user-controlled strings, this may allow an attacker to inject terminal control commands, leading to a leak of restricted information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sudo: Sudo does not escape control characters in log messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28486"
},
{
"category": "external",
"summary": "RHBZ#2179272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28486"
}
],
"release_date": "2023-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "sudo: Sudo does not escape control characters in log messages"
},
{
"cve": "CVE-2023-28487",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2023-03-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2179273"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sudo package, shipped with Red Hat Enterprise Linux 8 and 9, where the \"sudoreplay -l\u0027 command improperly escapes terminal control characters. As sudo\u0027s log messages may contain user-controlled strings, this could allow an attacker to inject terminal control commands, leading to a leak of restricted information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sudo: Sudo does not escape control characters in sudoreplay output",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28487"
},
{
"category": "external",
"summary": "RHBZ#2179273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28487"
}
],
"release_date": "2023-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "sudo: Sudo does not escape control characters in sudoreplay output"
},
{
"cve": "CVE-2023-29406",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2023-07-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2222167"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang, where it is vulnerable to HTTP header injection caused by improper content validation of the Host header by the HTTP/1 client. A remote attacker can inject arbitrary HTTP headers by persuading a victim to visit a specially crafted Web page. This flaw allows the attacker to conduct various attacks against the vulnerable system, including Cross-site scripting, cache poisoning, or session hijacking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: insufficient sanitization of Host header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29406"
},
{
"category": "external",
"summary": "RHBZ#2222167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0",
"url": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0"
}
],
"release_date": "2023-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: insufficient sanitization of Host header"
},
{
"cve": "CVE-2023-29409",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-08-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228743"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29409"
},
{
"category": "external",
"summary": "RHBZ#2228743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409"
},
{
"category": "external",
"summary": "https://go.dev/cl/515257",
"url": "https://go.dev/cl/515257"
},
{
"category": "external",
"summary": "https://go.dev/issue/61460",
"url": "https://go.dev/issue/61460"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ",
"url": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-1987",
"url": "https://pkg.go.dev/vuln/GO-2023-1987"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys"
},
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39318",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237776"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not properly handle HMTL-like \"\u003c!--\" and \"--\u003e\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This issue may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of HTML-like comments within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "RHBZ#2237776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237776"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318"
},
{
"category": "external",
"summary": "https://go.dev/cl/526156",
"url": "https://go.dev/cl/526156"
},
{
"category": "external",
"summary": "https://go.dev/issue/62196",
"url": "https://go.dev/issue/62196"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2041.json",
"url": "https://vuln.go.dev/ID/GO-2023-2041.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of HTML-like comments within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39319",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237773"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of special tags within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "RHBZ#2237773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319"
},
{
"category": "external",
"summary": "https://go.dev/cl/526157",
"url": "https://go.dev/cl/526157"
},
{
"category": "external",
"summary": "https://go.dev/issue/62197",
"url": "https://go.dev/issue/62197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2043.json",
"url": "https://vuln.go.dev/ID/GO-2023-2043.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of special tags within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Martin Seemann"
]
}
],
"cve": "CVE-2023-39321",
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237777"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "RHBZ#2237777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2044.json",
"url": "https://vuln.go.dev/ID/GO-2023-2044.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections"
},
{
"acknowledgments": [
{
"names": [
"Marten Seemann"
]
}
],
"cve": "CVE-2023-39322",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237778"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: lack of a limit on buffered post-handshake",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "RHBZ#2237778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2045.json",
"url": "https://vuln.go.dev/ID/GO-2023-2045.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: lack of a limit on buffered post-handshake"
},
{
"cve": "CVE-2023-39615",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2235864"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Libxml2, where it contains a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a denial of service (DoS) by supplying a crafted XML file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: crafted xml can cause global buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39615"
},
{
"category": "external",
"summary": "RHBZ#2235864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235864"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39615"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/535",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/535"
}
],
"release_date": "2023-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: crafted xml can cause global buffer overflow"
},
{
"cve": "CVE-2023-42282",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2024-02-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265161"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the NPM IP Package. This flaw allows an attacker to perform arbitrary code execution and obtain sensitive information via the isPublic() function by inducing a Server-Side Request Forgery (SSRF) attack and obtaining access to normally inaccessible resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-ip: arbitrary code execution via the isPublic() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "It appears that npm does not utilize the bundled code therefore Red Hat Enterprise Linux is not affected by this vulnerability.\n\nWhile the vulnerability in the NPM IP Package presents a significant security concern, it\u0027s categorized as important rather than critical due to several factors. Firstly, the misclassification of the private IP address 0x7f.1 as public by the isPublic() function does not directly lead to remote code execution or unauthorized access to critical systems. Instead, it facilitates SSRF attacks, which typically require additional conditions to fully exploit, such as the ability to influence server-side requests and responses. Additionally, the impact of SSRF attacks can vary depending on the specific environment and configuration of the affected system. While SSRF attacks can potentially lead to data exposure, service disruption, or lateral movement within a network, their severity is often mitigated by factors such as network segmentation, access controls, and the availability of sensitive resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42282"
},
{
"category": "external",
"summary": "RHBZ#2265161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42282"
},
{
"category": "external",
"summary": "https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html",
"url": "https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html"
}
],
"release_date": "2024-02-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs-ip: arbitrary code execution via the isPublic() function"
},
{
"cve": "CVE-2023-42465",
"cwe": {
"id": "CWE-1319",
"name": "Improper Protection against Electromagnetic Fault Injection (EM-FI)"
},
"discovery_date": "2023-12-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2255568"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sudo package. This issue could allow a local authenticated attacker to cause a bit to flip, which enables fault injection and may authenticate as the root user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sudo: Targeted Corruption of Register and Stack Variables",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "\"Mayhem\" is a potent attack technique that focuses on the core components of computing systems, specifically the CPU internals and stack variables. This method signifies a noteworthy advancement in cyber threats, demonstrating a successful ability to tamper with a computer\u0027s memory and compromise both stack and register variables. Capitalizing on the well-known Rowhammer effect, wherein swift access to a DRAM row induces bit flips in neighboring rows, this clever attack exploits these bit flips to disrupt stack variables and manipulate register values within a given process. The manipulation is accomplished by targeting register values stored in the process\u0027s stack, which, once flushed out to memory, become vulnerable to Rowhammer attacks. When reloaded, these corrupted values cause chaos, compromising the integrity of the entire process. It\u0027s important to note that this attack is confined to the local system, leading us to categorize it as a moderate threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42465"
},
{
"category": "external",
"summary": "RHBZ#2255568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255568"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42465"
},
{
"category": "external",
"summary": "https://arxiv.org/pdf/2309.02545.pdf",
"url": "https://arxiv.org/pdf/2309.02545.pdf"
},
{
"category": "external",
"summary": "https://github.com/sudo-project/sudo/commit/7873f8334c8d31031f8cfa83bd97ac6029309e4f",
"url": "https://github.com/sudo-project/sudo/commit/7873f8334c8d31031f8cfa83bd97ac6029309e4f"
}
],
"release_date": "2023-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "In general to address this issue, it\u0027s crucial to implement robust logic that prevents unintended execution from a single-bit flip. \n\nBut mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "sudo: Targeted Corruption of Register and Stack Variables"
},
{
"cve": "CVE-2023-43646",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-09-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241149"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the get-func-name package in the chai module. Affected versions of this package are vulnerable to Regular expression denial of service (ReDoS) attacks, affecting system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "get-func-name: ReDoS in chai module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "- This vulnerability can be exploited when there is an imbalance in parentheses, which results in excessive backtracking and subsequently increases the CPU load and processing time significantly. This vulnerability can be triggered using the following input: \u0027\\t\u0027.repeat(54773) + \u0027\\t/function/i\u0027\n\n- The get-func-name package is a build-time dependency in Red Hat products, which reduces the chance of successful exploitation. Hence, the impact is set to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43646"
},
{
"category": "external",
"summary": "RHBZ#2241149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43646"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-4q6p-r6v2-jvc5",
"url": "https://github.com/advisories/GHSA-4q6p-r6v2-jvc5"
},
{
"category": "external",
"summary": "https://github.com/chaijs/get-func-name/blob/78ad756441a83f3dc203e50f76c113ae3ac017dc/index.js#L15",
"url": "https://github.com/chaijs/get-func-name/blob/78ad756441a83f3dc203e50f76c113ae3ac017dc/index.js#L15"
}
],
"release_date": "2023-09-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "get-func-name: ReDoS in chai module"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
},
{
"acknowledgments": [
{
"names": [
"Harry Sintonen"
],
"organization": "reported"
},
{
"names": [
"Daniel Stenberg"
],
"organization": "patched"
}
],
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2023-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2252030"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl that verifies a given cookie domain against the Public Suffix List. This issue could allow a malicious HTTP server to set \"super cookies\" in curl that are passed back to more origins than what is otherwise allowed or possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: information disclosure by exploiting a mixed case flaw",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "When curl is built without PSL support, it cannot protect against this problem but it is expected to not allow \"too wide\" cookies when PSL support is enabled.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-46218"
},
{
"category": "external",
"summary": "RHBZ#2252030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252030"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46218",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46218"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2023-46218.html",
"url": "https://curl.se/docs/CVE-2023-46218.html"
}
],
"release_date": "2023-12-06T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: information disclosure by exploiting a mixed case flaw"
},
{
"cve": "CVE-2023-48631",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254559"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in Adobe\u0027s css-tools when parsing CSS. This issue occurs due to improper input validation and may allow an attacker to use a carefully crafted input string to cause a denial of service, especially when attempting to parse CSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "css-tools: regular expression denial of service (ReDoS) when parsing CSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Regular Expression Denial of Service (ReDoS) vulnerability in css-tools, triggered by improper input validation when parsing CSS, is considered of moderate severity. While it can lead to a denial of service by causing the application to become unresponsive, the impact is limited to scenarios where an attacker can provide crafted input. Additionally, the absence of evidence of active exploitation in the wild and contextual factors, such as the software\u0027s usage, contribute to the moderate severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c