Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-16276 (GCVE-0-2019-16276)
Vulnerability from cvelistv5
Published
2019-09-30 18:40
      Modified
2024-08-05 01:10
      
          Severity ?
        
        
          VLAI Severity ?
        
        
          EPSS score ?
        
        CWE
          - n/a
 
Summary
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
            
          
        References
          {
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:10:41.714Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/golang/go/issues/34540"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
          },
          {
            "name": "FEDORA-2019-1b8cbd39ff",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/"
          },
          {
            "name": "FEDORA-2019-416d20f960",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/"
          },
          {
            "name": "FEDORA-2019-e99c1603c3",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/"
          },
          {
            "name": "openSUSE-SU-2019:2522",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html"
          },
          {
            "name": "openSUSE-SU-2019:2521",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20191122-0004/"
          },
          {
            "name": "RHSA-2020:0101",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2020:0101"
          },
          {
            "name": "RHSA-2020:0329",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2020:0329"
          },
          {
            "name": "RHSA-2020:0652",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2020:0652"
          },
          {
            "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html"
          },
          {
            "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-09-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-03-13T20:06:30",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/golang/go/issues/34540"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        },
        {
          "name": "FEDORA-2019-1b8cbd39ff",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/"
        },
        {
          "name": "FEDORA-2019-416d20f960",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/"
        },
        {
          "name": "FEDORA-2019-e99c1603c3",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/"
        },
        {
          "name": "openSUSE-SU-2019:2522",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html"
        },
        {
          "name": "openSUSE-SU-2019:2521",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20191122-0004/"
        },
        {
          "name": "RHSA-2020:0101",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2020:0101"
        },
        {
          "name": "RHSA-2020:0329",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2020:0329"
        },
        {
          "name": "RHSA-2020:0652",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2020:0652"
        },
        {
          "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html"
        },
        {
          "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-16276",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/golang/go/issues/34540",
              "refsource": "CONFIRM",
              "url": "https://github.com/golang/go/issues/34540"
            },
            {
              "name": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
              "refsource": "MISC",
              "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
            },
            {
              "name": "FEDORA-2019-1b8cbd39ff",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/"
            },
            {
              "name": "FEDORA-2019-416d20f960",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/"
            },
            {
              "name": "FEDORA-2019-e99c1603c3",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/"
            },
            {
              "name": "openSUSE-SU-2019:2522",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html"
            },
            {
              "name": "openSUSE-SU-2019:2521",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20191122-0004/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20191122-0004/"
            },
            {
              "name": "RHSA-2020:0101",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2020:0101"
            },
            {
              "name": "RHSA-2020:0329",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2020:0329"
            },
            {
              "name": "RHSA-2020:0652",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2020:0652"
            },
            {
              "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html"
            },
            {
              "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-16276",
    "datePublished": "2019-09-30T18:40:12",
    "dateReserved": "2019-09-12T00:00:00",
    "dateUpdated": "2024-08-05T01:10:41.714Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-16276\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-09-30T19:15:08.790\",\"lastModified\":\"2024-11-21T04:30:26.170\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.\"},{\"lang\":\"es\",\"value\":\"Go versiones anteriores a 1.12.10 y versiones 1.13.x anteriores a 1.13.1, permitir el Trafico No Autorizado de Peticiones HTTP.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-444\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.12.10\",\"matchCriteriaId\":\"780FC85E-2CAD-4605-8DA2-CE16EB2034A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.13\",\"versionEndExcluding\":\"1.13.1\",\"matchCriteriaId\":\"3FDA5CF5-27C2-4DA5-852D-1A69271DB7EE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C85A84D-A70F-4B02-9E5D-CD9660ABF048\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60937D60-6B78-400F-8D30-7FCF328659A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BC9265-6959-4D37-BE5E-8C45E98992F8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_insights_telegraf_agent:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DAE7369-EEC5-405E-9D13-858335FDA647\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0101\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0329\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0652\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/golang/go/issues/34540\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20191122-0004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0329\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0652\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/golang/go/issues/34540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20191122-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}
  WID-SEC-W-2024-1098
Vulnerability from csaf_certbund
Published
2020-01-13 23:00
    Modified
2024-05-15 22:00
    Summary
Red Hat Developer Toolset: Mehrere Schwachstellen
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
Das Red Hat Developer Toolset beinhaltet Open-Source-Entwicklungs-Anwendungen und ermöglicht den Entwicklern, ihre Software einmal zu kompilieren und auf jedem Red Hat Enterprise Linux bereitzustellen.
    Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Developer Toolset ausnutzen, um Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen.
    Betroffene Betriebssysteme
- Linux
    {
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Das Red Hat Developer Toolset beinhaltet Open-Source-Entwicklungs-Anwendungen und erm\u00f6glicht den Entwicklern, ihre Software einmal zu kompilieren und auf jedem Red Hat Enterprise Linux bereitzustellen.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Developer Toolset ausnutzen, um Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-1098 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2024-1098.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-1098 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1098"
      },
      {
        "category": "external",
        "summary": "RedHat Security Advisory vom 2020-01-13",
        "url": "https://access.redhat.com/errata/RHSA-2020:0101"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0329 vom 2020-02-04",
        "url": "https://access.redhat.com/errata/RHSA-2020:0329"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0652 vom 2020-03-05",
        "url": "https://access.redhat.com/errata/RHSA-2020:0652"
      },
      {
        "category": "external",
        "summary": "Arista Security Advisory 0046",
        "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2591 vom 2021-03-13",
        "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2592 vom 2021-03-13",
        "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-1938 vom 2024-05-13",
        "url": "https://alas.aws.amazon.com/ALAS-2024-1938.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-2545 vom 2024-05-15",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2545.html"
      }
    ],
    "source_lang": "en-US",
    "title": "Red Hat Developer Toolset: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-05-15T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T18:08:49.008+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2024-1098",
      "initial_release_date": "2020-01-13T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2020-01-13T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2020-02-03T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-03-05T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-03-23T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2021-03-14T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2024-05-13T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-05-15T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Amazon aufgenommen"
        }
      ],
      "status": "final",
      "version": "7"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Developer Toolset",
            "product": {
              "name": "Red Hat Developer Toolset",
              "product_id": "T011434",
              "product_identification_helper": {
                "cpe": "cpe:/a:redhat:developer_toolset:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Red Hat Developer Toolset. HTTP Anfragen werden in net/http (\u00fcber net/textproto) in golang nicht sachgem\u00e4\u00df verarbeitet. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sciherheitsma\u00dfnahmen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "2951",
          "T011434",
          "67646",
          "398363"
        ]
      },
      "release_date": "2020-01-13T23:00:00.000+00:00",
      "title": "CVE-2019-16276"
    },
    {
      "cve": "CVE-2019-17596",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Red Hat Developer Toolset. Wenn Go versucht Netzwerkverkehr mit einem ung\u00fcltigen \u00f6ffentlichen DSA-Schl\u00fcssel zu verarbeiten, kann es zu einer Panic kommen. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "2951",
          "T011434",
          "67646",
          "398363"
        ]
      },
      "release_date": "2020-01-13T23:00:00.000+00:00",
      "title": "CVE-2019-17596"
    }
  ]
}
  wid-sec-w-2024-1098
Vulnerability from csaf_certbund
Published
2020-01-13 23:00
    Modified
2024-05-15 22:00
    Summary
Red Hat Developer Toolset: Mehrere Schwachstellen
    Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
    Produktbeschreibung
Das Red Hat Developer Toolset beinhaltet Open-Source-Entwicklungs-Anwendungen und ermöglicht den Entwicklern, ihre Software einmal zu kompilieren und auf jedem Red Hat Enterprise Linux bereitzustellen.
    Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Developer Toolset ausnutzen, um Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen.
    Betroffene Betriebssysteme
- Linux
    {
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Das Red Hat Developer Toolset beinhaltet Open-Source-Entwicklungs-Anwendungen und erm\u00f6glicht den Entwicklern, ihre Software einmal zu kompilieren und auf jedem Red Hat Enterprise Linux bereitzustellen.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Developer Toolset ausnutzen, um Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-1098 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2024-1098.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-1098 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1098"
      },
      {
        "category": "external",
        "summary": "RedHat Security Advisory vom 2020-01-13",
        "url": "https://access.redhat.com/errata/RHSA-2020:0101"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0329 vom 2020-02-04",
        "url": "https://access.redhat.com/errata/RHSA-2020:0329"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:0652 vom 2020-03-05",
        "url": "https://access.redhat.com/errata/RHSA-2020:0652"
      },
      {
        "category": "external",
        "summary": "Arista Security Advisory 0046",
        "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2591 vom 2021-03-13",
        "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2592 vom 2021-03-13",
        "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-1938 vom 2024-05-13",
        "url": "https://alas.aws.amazon.com/ALAS-2024-1938.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-2545 vom 2024-05-15",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2545.html"
      }
    ],
    "source_lang": "en-US",
    "title": "Red Hat Developer Toolset: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-05-15T22:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T18:08:49.008+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2024-1098",
      "initial_release_date": "2020-01-13T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2020-01-13T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2020-02-03T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-03-05T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-03-23T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2021-03-14T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2024-05-13T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-05-15T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Amazon aufgenommen"
        }
      ],
      "status": "final",
      "version": "7"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Developer Toolset",
            "product": {
              "name": "Red Hat Developer Toolset",
              "product_id": "T011434",
              "product_identification_helper": {
                "cpe": "cpe:/a:redhat:developer_toolset:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Red Hat Developer Toolset. HTTP Anfragen werden in net/http (\u00fcber net/textproto) in golang nicht sachgem\u00e4\u00df verarbeitet. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sciherheitsma\u00dfnahmen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "2951",
          "T011434",
          "67646",
          "398363"
        ]
      },
      "release_date": "2020-01-13T23:00:00.000+00:00",
      "title": "CVE-2019-16276"
    },
    {
      "cve": "CVE-2019-17596",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Red Hat Developer Toolset. Wenn Go versucht Netzwerkverkehr mit einem ung\u00fcltigen \u00f6ffentlichen DSA-Schl\u00fcssel zu verarbeiten, kann es zu einer Panic kommen. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "2951",
          "T011434",
          "67646",
          "398363"
        ]
      },
      "release_date": "2020-01-13T23:00:00.000+00:00",
      "title": "CVE-2019-17596"
    }
  ]
}
  RHSA-2020:0652
Vulnerability from csaf_redhat
Published
2020-03-05 20:37
    Modified
2025-10-15 11:13
    Summary
Red Hat Security Advisory: OpenShift Container Platform 4.2.21 openshift/installer security update
    Notes
Topic
An update for ose-installer-artifacts-container and ose-installer-container is now available for Red Hat OpenShift Container Platform 4.2.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* golang: HTTP/1.1 headers with a space before the colon led to filter bypass or request smuggling (CVE-2019-16276)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for ose-installer-artifacts-container and ose-installer-container is now available for Red Hat OpenShift Container Platform 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: HTTP/1.1 headers with a space before the colon led to filter bypass or request smuggling (CVE-2019-16276)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:0652",
        "url": "https://access.redhat.com/errata/RHSA-2020:0652"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1755969",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0652.json"
      }
    ],
    "title": "Red Hat Security Advisory: OpenShift Container Platform 4.2.21 openshift/installer security update",
    "tracking": {
      "current_release_date": "2025-10-15T11:13:19+00:00",
      "generator": {
        "date": "2025-10-15T11:13:19+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2020:0652",
      "initial_release_date": "2020-03-05T20:37:44+00:00",
      "revision_history": [
        {
          "date": "2020-03-05T20:37:44+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-03-05T20:37:44+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-15T11:13:19+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "7Server-RH7-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
                "product": {
                  "name": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
                  "product_id": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.2.21-202002240343"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64",
                "product": {
                  "name": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64",
                  "product_id": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.2.21-202002240343"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
                "product": {
                  "name": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
                  "product_id": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.2.21-202002240343"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
                "product": {
                  "name": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
                  "product_id": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.2.21-202002240343"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x"
        },
        "product_reference": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64"
        },
        "product_reference": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x"
        },
        "product_reference": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64"
        },
        "product_reference": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-03-05T20:37:44+00:00",
          "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.21, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.2/updating/updating-cluster-cli.html.",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0652"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    }
  ]
}
  rhba-2019:3303
Vulnerability from csaf_redhat
Published
2019-11-13 18:55
    Modified
2025-10-15 11:13
    Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 images update
    Notes
Topic
Red Hat OpenShift Container Platform release 4.2.4 is now available with
updates to packages and images that fix several bugs.
    Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat
4OpenShift Container Platform 4.2.4. See the following advisory for the
RPM packages for this release:
https://access.redhat.com/errata/RHBA-2019:3304
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-rel
ease-notes.html
You may download the oc tool and use it to inspect release image metadata
as follows:
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.2.4
The image digest is
sha256:e8ed03f1fb2ef07c15ec4c8ce1bc29962225f32572e9d36c81cf110c1bff9268
All OpenShift Container Platform 4.2 users are advised to upgrade to these
updated packages and images.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat OpenShift Container Platform release 4.2.4 is now available with\nupdates to packages and images that fix several bugs.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat\n4OpenShift Container Platform 4.2.4. See the following advisory for the\nRPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:3304\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-rel\nease-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.2.4\n\nThe image digest is\nsha256:e8ed03f1fb2ef07c15ec4c8ce1bc29962225f32572e9d36c81cf110c1bff9268\n\nAll OpenShift Container Platform 4.2 users are advised to upgrade to these\nupdated packages and images.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2019:3303",
        "url": "https://access.redhat.com/errata/RHBA-2019:3303"
      },
      {
        "category": "external",
        "summary": "1755557",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755557"
      },
      {
        "category": "external",
        "summary": "1755780",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755780"
      },
      {
        "category": "external",
        "summary": "1756478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756478"
      },
      {
        "category": "external",
        "summary": "1757134",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757134"
      },
      {
        "category": "external",
        "summary": "1757234",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757234"
      },
      {
        "category": "external",
        "summary": "1757390",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757390"
      },
      {
        "category": "external",
        "summary": "1758373",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758373"
      },
      {
        "category": "external",
        "summary": "1759181",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759181"
      },
      {
        "category": "external",
        "summary": "1759400",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759400"
      },
      {
        "category": "external",
        "summary": "1759986",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759986"
      },
      {
        "category": "external",
        "summary": "1760044",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760044"
      },
      {
        "category": "external",
        "summary": "1760480",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760480"
      },
      {
        "category": "external",
        "summary": "1761507",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761507"
      },
      {
        "category": "external",
        "summary": "1761814",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761814"
      },
      {
        "category": "external",
        "summary": "1761879",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761879"
      },
      {
        "category": "external",
        "summary": "1761887",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761887"
      },
      {
        "category": "external",
        "summary": "1762409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762409"
      },
      {
        "category": "external",
        "summary": "1762960",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762960"
      },
      {
        "category": "external",
        "summary": "1763057",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763057"
      },
      {
        "category": "external",
        "summary": "1763205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763205"
      },
      {
        "category": "external",
        "summary": "1763279",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763279"
      },
      {
        "category": "external",
        "summary": "1763749",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763749"
      },
      {
        "category": "external",
        "summary": "1763822",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763822"
      },
      {
        "category": "external",
        "summary": "1763891",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763891"
      },
      {
        "category": "external",
        "summary": "1764227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764227"
      },
      {
        "category": "external",
        "summary": "1765308",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765308"
      },
      {
        "category": "external",
        "summary": "1767237",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767237"
      },
      {
        "category": "external",
        "summary": "1767943",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767943"
      },
      {
        "category": "external",
        "summary": "1767948",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767948"
      },
      {
        "category": "external",
        "summary": "1767951",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767951"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_3303.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 images update",
    "tracking": {
      "current_release_date": "2025-10-15T11:13:11+00:00",
      "generator": {
        "date": "2025-10-15T11:13:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHBA-2019:3303",
      "initial_release_date": "2019-11-13T18:55:26+00:00",
      "revision_history": [
        {
          "date": "2019-11-13T18:55:26+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-13T18:55:26+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-15T11:13:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "7Server-RH7-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "8Base-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
                  "product_id": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
                  "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
                  "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
                  "product_id": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.2.4-201911071400"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
                  "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
                  "product_id": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
                "product": {
                  "name": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
                  "product_id": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
                "product": {
                  "name": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
                  "product_id": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
                "product": {
                  "name": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
                  "product_id": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
                  "product_id": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
                  "product_id": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
                "product": {
                  "name": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
                  "product_id": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
                  "product_id": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
                  "product_id": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-inspector-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
                  "product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
                  "product_id": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhcos-downloader-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64",
                  "product_id": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-static-ip-manager-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
                  "product_id": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
                  "product_id": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
                "product": {
                  "name": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
                  "product_id": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
                "product": {
                  "name": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
                  "product_id": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
                "product": {
                  "name": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
                  "product_id": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
                "product": {
                  "name": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
                  "product_id": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
                "product": {
                  "name": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
                  "product_id": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-controller-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
                "product": {
                  "name": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
                  "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
                "product": {
                  "name": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
                  "product_id": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
                "product": {
                  "name": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
                  "product_id": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
                "product": {
                  "name": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
                  "product_id": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
                "product": {
                  "name": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
                  "product_id": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
                "product": {
                  "name": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
                  "product_id": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
                "product": {
                  "name": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
                  "product_id": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
                "product": {
                  "name": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
                  "product_id": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
                "product": {
                  "name": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
                  "product_id": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
                "product": {
                  "name": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
                  "product_id": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
                "product": {
                  "name": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
                  "product_id": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
                "product": {
                  "name": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
                  "product_id": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
                "product": {
                  "name": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
                  "product_id": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
                "product": {
                  "name": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
                  "product_id": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-catalog\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
                "product": {
                  "name": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
                  "product_id": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.2.4-201911072324"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
                  "product_id": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
                  "product_id": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
                "product": {
                  "name": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
                  "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
                "product": {
                  "name": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
                  "product_id": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
                "product": {
                  "name": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
                  "product_id": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
                "product": {
                  "name": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
                  "product_id": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
                  "product_id": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel7\u0026tag=v4.2.4-201911071400"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
                  "product_id": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel7-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
                  "product_id": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
                "product": {
                  "name": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
                  "product_id": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
                "product": {
                  "name": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
                  "product_id": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
                  "product_id": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
                  "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
                  "product_id": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
                  "product_id": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
                  "product_id": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
                  "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
                  "product_id": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
                  "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
                  "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
                  "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
                  "product_id": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
                  "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
                  "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
                  "product_id": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
                  "product_id": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
                  "product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
                  "product_id": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-controller-manager-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
                  "product_id": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
                "product": {
                  "name": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
                  "product_id": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
                "product": {
                  "name": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
                  "product_id": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
                "product": {
                  "name": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
                  "product_id": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-machine-controllers-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
                "product": {
                  "name": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
                  "product_id": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel7-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
                "product": {
                  "name": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
                  "product_id": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.2.4-201911071400"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
                "product": {
                  "name": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
                  "product_id": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.2.4-201911071400"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
                "product": {
                  "name": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
                  "product_id": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-client-agent\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
                "product": {
                  "name": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
                  "product_id": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-etcd-signer-server\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
                "product": {
                  "name": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
                  "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
                "product": {
                  "name": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
                  "product_id": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
                "product": {
                  "name": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
                  "product_id": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
                "product": {
                  "name": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
                  "product_id": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
                "product": {
                  "name": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
                  "product_id": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
                "product": {
                  "name": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
                  "product_id": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
                "product": {
                  "name": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
                  "product_id": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-controller-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
                "product": {
                  "name": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
                  "product_id": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
                  "product_id": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
                  "product_id": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
                "product": {
                  "name": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
                  "product_id": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
                "product": {
                  "name": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
                  "product_id": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
                "product": {
                  "name": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
                  "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
                "product": {
                  "name": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
                  "product_id": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
                  "product_id": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
                  "product_id": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
                "product": {
                  "name": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
                  "product_id": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
                "product": {
                  "name": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
                  "product_id": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
                  "product_id": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuned\u0026tag=v4.2.4-201911050122"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64"
        },
        "product_reference": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64"
        },
        "product_reference": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64"
        },
        "product_reference": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64"
        },
        "product_reference": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64"
        },
        "product_reference": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64"
        },
        "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64"
        },
        "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64"
        },
        "product_reference": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64"
        },
        "product_reference": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64"
        },
        "product_reference": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64"
        },
        "product_reference": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64"
        },
        "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64"
        },
        "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64"
        },
        "product_reference": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64"
        },
        "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64"
        },
        "product_reference": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64"
        },
        "product_reference": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64"
        },
        "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64"
        },
        "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64"
        },
        "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64"
        },
        "product_reference": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64"
        },
        "product_reference": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64"
        },
        "product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64"
        },
        "product_reference": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64"
        },
        "product_reference": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64"
        },
        "product_reference": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64"
        },
        "product_reference": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64"
        },
        "product_reference": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64"
        },
        "product_reference": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64"
        },
        "product_reference": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64"
        },
        "product_reference": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64"
        },
        "product_reference": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64"
        },
        "product_reference": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64"
        },
        "product_reference": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64"
        },
        "product_reference": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64"
        },
        "product_reference": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64"
        },
        "product_reference": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64"
        },
        "product_reference": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64"
        },
        "product_reference": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64"
        },
        "product_reference": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64"
        },
        "product_reference": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64"
        },
        "product_reference": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64"
        },
        "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64"
        },
        "product_reference": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64"
        },
        "product_reference": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64"
        },
        "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64"
        },
        "product_reference": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64"
        },
        "product_reference": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64"
        },
        "product_reference": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64"
        },
        "product_reference": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64"
        },
        "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64"
        },
        "product_reference": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64"
        },
        "product_reference": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64"
        },
        "product_reference": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64"
        },
        "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64"
        },
        "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64"
        },
        "product_reference": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64"
        },
        "product_reference": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64"
        },
        "product_reference": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64"
        },
        "product_reference": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64"
        },
        "product_reference": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64"
        },
        "product_reference": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64"
        },
        "product_reference": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64"
        },
        "product_reference": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64"
        },
        "product_reference": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64"
        },
        "product_reference": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64"
        },
        "product_reference": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64"
        },
        "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64"
        },
        "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64"
        },
        "product_reference": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64"
        },
        "product_reference": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64"
        },
        "product_reference": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64"
        },
        "product_reference": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64"
        },
        "product_reference": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64"
        },
        "product_reference": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64"
        },
        "product_reference": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64"
        },
        "product_reference": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64"
        },
        "product_reference": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64"
        },
        "product_reference": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64"
        },
        "product_reference": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64"
        },
        "product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64"
        },
        "product_reference": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64"
        },
        "product_reference": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64"
        },
        "product_reference": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64"
        ],
        "known_not_affected": [
          "7Server-RH7-RHOSE-4.2:openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-13T18:55:26+00:00",
          "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.4, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2019:3303"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    }
  ]
}
  RHSA-2020:0329
Vulnerability from csaf_redhat
Published
2020-02-04 13:21
    Modified
2025-10-15 11:13
    Summary
Red Hat Security Advisory: go-toolset:rhel8 security update
    Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)
* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)\n\n* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:0329",
        "url": "https://access.redhat.com/errata/RHSA-2020:0329"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1755969",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
      },
      {
        "category": "external",
        "summary": "1763310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763310"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0329.json"
      }
    ],
    "title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
    "tracking": {
      "current_release_date": "2025-10-15T11:13:18+00:00",
      "generator": {
        "date": "2025-10-15T11:13:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2020:0329",
      "initial_release_date": "2020-02-04T13:21:59+00:00",
      "revision_history": [
        {
          "date": "2020-02-04T13:21:59+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-02-04T13:21:59+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-15T11:13:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.1.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
                "product": {
                  "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm (go-toolset:rhel8)",
                  "product_id": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=src\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm (go-toolset:rhel8)",
                  "product_id": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=src\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8)",
                  "product_id": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8)",
                  "product_id": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8)",
                  "product_id": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-bin@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8)",
                  "product_id": "golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-race@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8)",
                  "product_id": "golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-docs@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=noarch\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8)",
                  "product_id": "golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-misc@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=noarch\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8)",
                  "product_id": "golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-src@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=noarch\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8)",
                  "product_id": "golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-tests@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=noarch\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
                "product": {
                  "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm (go-toolset:rhel8)",
                  "product_id": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=s390x\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm (go-toolset:rhel8)",
                  "product_id": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=s390x\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm (go-toolset:rhel8)",
                  "product_id": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-bin@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=s390x\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
                "product": {
                  "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm (go-toolset:rhel8)",
                  "product_id": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm (go-toolset:rhel8)",
                  "product_id": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm (go-toolset:rhel8)",
                  "product_id": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-bin@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm (go-toolset:rhel8)",
                  "product_id": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm (go-toolset:rhel8)",
                  "product_id": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm (go-toolset:rhel8)",
                  "product_id": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-bin@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8"
        },
        "product_reference": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8"
        },
        "product_reference": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8"
        },
        "product_reference": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8"
        },
        "product_reference": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8"
        },
        "product_reference": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-02-04T13:21:59+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0329"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    },
    {
      "cve": "CVE-2019-17596",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "discovery_date": "2019-10-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1763310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: invalid public key causes panic in dsa.Verify",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "RHBZ#1763310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17596",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17596",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ"
        }
      ],
      "release_date": "2019-10-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-02-04T13:21:59+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0329"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: invalid public key causes panic in dsa.Verify"
    }
  ]
}
  rhsa-2020:0101
Vulnerability from csaf_redhat
Published
2020-01-14 08:45
    Modified
2025-10-15 11:13
    Summary
Red Hat Security Advisory: go-toolset-1.12-golang security update
    Notes
Topic
An update for go-toolset-1.12 and go-toolset-1.12-golang is now available for Red Hat Developer Tools.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
The following packages have been upgraded to a later upstream version: go-toolset-1.12-golang (1.12.12). (BZ#1759840, BZ#1785389)
Security Fix(es):
* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)
* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for go-toolset-1.12 and go-toolset-1.12-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nThe following packages have been upgraded to a later upstream version: go-toolset-1.12-golang (1.12.12). (BZ#1759840, BZ#1785389)\n\nSecurity Fix(es):\n\n* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)\n\n* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:0101",
        "url": "https://access.redhat.com/errata/RHSA-2020:0101"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1755969",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
      },
      {
        "category": "external",
        "summary": "1763310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763310"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0101.json"
      }
    ],
    "title": "Red Hat Security Advisory: go-toolset-1.12-golang security update",
    "tracking": {
      "current_release_date": "2025-10-15T11:13:18+00:00",
      "generator": {
        "date": "2025-10-15T11:13:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2020:0101",
      "initial_release_date": "2020-01-14T08:45:49+00:00",
      "revision_history": [
        {
          "date": "2020-01-14T08:45:49+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-01-14T08:45:49+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-15T11:13:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-DevTools-2019.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:devtools:2019"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-DevTools-2019.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:devtools:2019"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Developer Tools"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-bin@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-misc@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-race@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-src@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-tests@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-build@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-runtime@1.12.12-4.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
                "product": {
                  "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
                  "product_id": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang@1.12.12-4.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-0:1.12.12-4.el7.src",
                "product": {
                  "name": "go-toolset-1.12-0:1.12.12-4.el7.src",
                  "product_id": "go-toolset-1.12-0:1.12.12-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12@1.12.12-4.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
                "product": {
                  "name": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
                  "product_id": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-docs@1.12.12-4.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-bin@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-misc@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-src@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-tests@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-build@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-runtime@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-bin@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-misc@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-src@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-tests@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-build@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-runtime@1.12.12-4.el7?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.src",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch"
        },
        "product_reference": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.src",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch"
        },
        "product_reference": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-01-14T08:45:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0101"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    },
    {
      "cve": "CVE-2019-17596",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "discovery_date": "2019-10-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1763310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: invalid public key causes panic in dsa.Verify",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "RHBZ#1763310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17596",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17596",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ"
        }
      ],
      "release_date": "2019-10-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-01-14T08:45:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0101"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: invalid public key causes panic in dsa.Verify"
    }
  ]
}
  rhsa-2020:0652
Vulnerability from csaf_redhat
Published
2020-03-05 20:37
    Modified
2025-10-15 11:13
    Summary
Red Hat Security Advisory: OpenShift Container Platform 4.2.21 openshift/installer security update
    Notes
Topic
An update for ose-installer-artifacts-container and ose-installer-container is now available for Red Hat OpenShift Container Platform 4.2.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* golang: HTTP/1.1 headers with a space before the colon led to filter bypass or request smuggling (CVE-2019-16276)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for ose-installer-artifacts-container and ose-installer-container is now available for Red Hat OpenShift Container Platform 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: HTTP/1.1 headers with a space before the colon led to filter bypass or request smuggling (CVE-2019-16276)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:0652",
        "url": "https://access.redhat.com/errata/RHSA-2020:0652"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1755969",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0652.json"
      }
    ],
    "title": "Red Hat Security Advisory: OpenShift Container Platform 4.2.21 openshift/installer security update",
    "tracking": {
      "current_release_date": "2025-10-15T11:13:19+00:00",
      "generator": {
        "date": "2025-10-15T11:13:19+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2020:0652",
      "initial_release_date": "2020-03-05T20:37:44+00:00",
      "revision_history": [
        {
          "date": "2020-03-05T20:37:44+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-03-05T20:37:44+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-15T11:13:19+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "7Server-RH7-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
                "product": {
                  "name": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
                  "product_id": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.2.21-202002240343"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64",
                "product": {
                  "name": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64",
                  "product_id": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.2.21-202002240343"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
                "product": {
                  "name": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
                  "product_id": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.2.21-202002240343"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
                "product": {
                  "name": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
                  "product_id": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.2.21-202002240343"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x"
        },
        "product_reference": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64"
        },
        "product_reference": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x"
        },
        "product_reference": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64"
        },
        "product_reference": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-03-05T20:37:44+00:00",
          "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.21, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.2/updating/updating-cluster-cli.html.",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0652"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    }
  ]
}
  rhba-2019_3304
Vulnerability from csaf_redhat
Published
2019-11-13 16:48
    Modified
2024-11-13 22:06
    Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 bug fix update
    Notes
Topic
Red Hat OpenShift Container Platform release 4.2.4 is now available with
updates to packages and images that fix several bugs.
    Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat
OpenShift Container Platform 4.2.4. See the following advisory for the
container images for this release:
https://access.redhat.com/errata/RHBA-2019:3303
All OpenShift Container Platform 4.2 users are advised to upgrade to these
updated packages and images.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat OpenShift Container Platform release 4.2.4 is now available with\nupdates to packages and images that fix several bugs.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat\nOpenShift Container Platform 4.2.4. See the following advisory for the\ncontainer images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:3303\n\nAll OpenShift Container Platform 4.2 users are advised to upgrade to these\nupdated packages and images.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2019:3304",
        "url": "https://access.redhat.com/errata/RHBA-2019:3304"
      },
      {
        "category": "external",
        "summary": "1765304",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765304"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_3304.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 bug fix update",
    "tracking": {
      "current_release_date": "2024-11-13T22:06:54+00:00",
      "generator": {
        "date": "2024-11-13T22:06:54+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHBA-2019:3304",
      "initial_release_date": "2019-11-13T16:48:38+00:00",
      "revision_history": [
        {
          "date": "2019-11-13T16:48:38+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-13T16:48:38+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-13T22:06:54+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "8Base-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "7Server-RH7-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition-validate@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition-debugsource@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition-debuginfo@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64",
                "product": {
                  "name": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64",
                  "product_id": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pivot@0.0.5-2.rhaos4.2.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                "product": {
                  "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                  "product_id": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-clients@4.2.4-201911010432.git.1.30c33a5.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                "product": {
                  "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                  "product_id": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.2.4-201911010432.git.1.30c33a5.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
                "product": {
                  "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
                  "product_id": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-hyperkube@4.2.4-201911041319.git.0.c7d2111.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
                "product": {
                  "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
                  "product_id": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@4.2.4-201911010432.git.1.0b5cd44.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                "product": {
                  "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                  "product_id": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-clients@4.2.4-201911010432.git.1.30c33a5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                "product": {
                  "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                  "product_id": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.2.4-201911010432.git.1.30c33a5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
                "product": {
                  "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
                  "product_id": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.2.4-201911041319.git.1.4131c2f.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                "product": {
                  "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                  "product_id": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.2.4-201911041319.git.1.1de4bcd.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                "product": {
                  "name": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                  "product_id": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.2.4-201911041319.git.1.1de4bcd.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
                "product": {
                  "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
                  "product_id": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-hyperkube@4.2.4-201911041319.git.0.c7d2111.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "faq-0:0.0.6-4.el7.x86_64",
                "product": {
                  "name": "faq-0:0.0.6-4.el7.x86_64",
                  "product_id": "faq-0:0.0.6-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/faq@0.0.6-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64",
                "product": {
                  "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64",
                  "product_id": "faq-debuginfo-0:0.0.6-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-4.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
                "product": {
                  "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
                  "product_id": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pivot-0:0.0.5-2.rhaos4.2.el8.src",
                "product": {
                  "name": "pivot-0:0.0.5-2.rhaos4.2.el8.src",
                  "product_id": "pivot-0:0.0.5-2.rhaos4.2.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pivot@0.0.5-2.rhaos4.2.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
                "product": {
                  "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
                  "product_id": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift@4.2.4-201911041319.git.0.c7d2111.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
                "product": {
                  "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
                  "product_id": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@4.2.4-201911010432.git.1.0b5cd44.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
                "product": {
                  "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
                  "product_id": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-ansible@4.2.4-201911010432.git.190.b4a7b0f.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
                "product": {
                  "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
                  "product_id": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.2.4-201911041319.git.1.4131c2f.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
                "product": {
                  "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
                  "product_id": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.2.4-201911041319.git.1.1de4bcd.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
                "product": {
                  "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
                  "product_id": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift@4.2.4-201911041319.git.0.c7d2111.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
                "product": {
                  "name": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
                  "product_id": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-kuryr@4.2.4-201911042119.git.1.d838b90.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "faq-0:0.0.6-4.el7.src",
                "product": {
                  "name": "faq-0:0.0.6-4.el7.src",
                  "product_id": "faq-0:0.0.6-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/faq@0.0.6-4.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
                "product": {
                  "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
                  "product_id": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-ansible@4.2.4-201911010432.git.190.b4a7b0f.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                "product": {
                  "name": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_id": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.2.4-201911042119.git.1.d838b90.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                "product": {
                  "name": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_id": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.2.4-201911042119.git.1.d838b90.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                "product": {
                  "name": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_id": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.2.4-201911042119.git.1.d838b90.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                "product": {
                  "name": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_id": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python2-kuryr-kubernetes@4.2.4-201911042119.git.1.d838b90.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src"
        },
        "product_reference": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64"
        },
        "product_reference": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64"
        },
        "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src"
        },
        "product_reference": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64"
        },
        "product_reference": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "faq-0:0.0.6-4.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.src"
        },
        "product_reference": "faq-0:0.0.6-4.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "faq-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.x86_64"
        },
        "product_reference": "faq-0:0.0.6-4.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:faq-debuginfo-0:0.0.6-4.el7.x86_64"
        },
        "product_reference": "faq-debuginfo-0:0.0.6-4.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src"
        },
        "product_reference": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch"
        },
        "product_reference": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src"
        },
        "product_reference": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64"
        },
        "product_reference": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64"
        },
        "product_reference": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src"
        },
        "product_reference": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64"
        },
        "product_reference": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64"
        },
        "product_reference": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src"
        },
        "product_reference": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch"
        },
        "product_reference": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch"
        },
        "product_reference": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch"
        },
        "product_reference": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch"
        },
        "product_reference": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src"
        },
        "product_reference": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src"
        },
        "product_reference": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64"
        },
        "product_reference": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64"
        },
        "product_reference": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64"
        },
        "product_reference": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pivot-0:0.0.5-2.rhaos4.2.el8.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.src"
        },
        "product_reference": "pivot-0:0.0.5-2.rhaos4.2.el8.src",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.x86_64"
        },
        "product_reference": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.src",
            "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:faq-debuginfo-0:0.0.6-4.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
            "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.src",
            "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
          "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
          "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
          "7Server-RH7-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
          "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
          "8Base-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
          "8Base-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
          "8Base-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
          "8Base-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64"
        ],
        "known_not_affected": [
          "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.src",
          "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:faq-debuginfo-0:0.0.6-4.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
          "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
          "7Server-RH7-RHOSE-4.2:openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
          "7Server-RH7-RHOSE-4.2:openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
          "7Server-RH7-RHOSE-4.2:openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
          "7Server-RH7-RHOSE-4.2:openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
          "7Server-RH7-RHOSE-4.2:python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
          "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
          "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.src",
          "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-13T16:48:38+00:00",
          "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.4, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
            "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
            "8Base-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
            "8Base-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2019:3304"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
            "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
            "8Base-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
            "8Base-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    }
  ]
}
  rhsa-2020_0652
Vulnerability from csaf_redhat
Published
2020-03-05 20:37
    Modified
2024-11-13 22:12
    Summary
Red Hat Security Advisory: OpenShift Container Platform 4.2.21 openshift/installer security update
    Notes
Topic
An update for ose-installer-artifacts-container and ose-installer-container is now available for Red Hat OpenShift Container Platform 4.2.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* golang: HTTP/1.1 headers with a space before the colon led to filter bypass or request smuggling (CVE-2019-16276)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for ose-installer-artifacts-container and ose-installer-container is now available for Red Hat OpenShift Container Platform 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* golang: HTTP/1.1 headers with a space before the colon led to filter bypass or request smuggling (CVE-2019-16276)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:0652",
        "url": "https://access.redhat.com/errata/RHSA-2020:0652"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1755969",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0652.json"
      }
    ],
    "title": "Red Hat Security Advisory: OpenShift Container Platform 4.2.21 openshift/installer security update",
    "tracking": {
      "current_release_date": "2024-11-13T22:12:26+00:00",
      "generator": {
        "date": "2024-11-13T22:12:26+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHSA-2020:0652",
      "initial_release_date": "2020-03-05T20:37:44+00:00",
      "revision_history": [
        {
          "date": "2020-03-05T20:37:44+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-03-05T20:37:44+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-13T22:12:26+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "7Server-RH7-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
                "product": {
                  "name": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
                  "product_id": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.2.21-202002240343"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64",
                "product": {
                  "name": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64",
                  "product_id": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.2.21-202002240343"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
                "product": {
                  "name": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
                  "product_id": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.2.21-202002240343"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
                "product": {
                  "name": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
                  "product_id": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.2.21-202002240343"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x"
        },
        "product_reference": "openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64"
        },
        "product_reference": "openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x"
        },
        "product_reference": "openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64"
        },
        "product_reference": "openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-03-05T20:37:44+00:00",
          "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.21, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.2/updating/updating-cluster-cli.html.",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0652"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:41c8e72f58cdff8d65219d0da45ef381cc7b6db50e702edc9ee9cd4b662db05b_s390x",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:59830f36fe5430560e979f4628c47f18e2b3a4dcf7d6480ea1cece126a147bf5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:10542c71ffb400b3fb5eb760ff89cf214f43f40782352e7ecfa4cbf26566704a_s390x",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:c7d9b92f07e455467d99a90402026873b11716073820365ddf2408419e1aeff4_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    }
  ]
}
  rhsa-2020_0101
Vulnerability from csaf_redhat
Published
2020-01-14 08:45
    Modified
2024-11-13 22:11
    Summary
Red Hat Security Advisory: go-toolset-1.12-golang security update
    Notes
Topic
An update for go-toolset-1.12 and go-toolset-1.12-golang is now available for Red Hat Developer Tools.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
The following packages have been upgraded to a later upstream version: go-toolset-1.12-golang (1.12.12). (BZ#1759840, BZ#1785389)
Security Fix(es):
* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)
* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for go-toolset-1.12 and go-toolset-1.12-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nThe following packages have been upgraded to a later upstream version: go-toolset-1.12-golang (1.12.12). (BZ#1759840, BZ#1785389)\n\nSecurity Fix(es):\n\n* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)\n\n* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:0101",
        "url": "https://access.redhat.com/errata/RHSA-2020:0101"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1755969",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
      },
      {
        "category": "external",
        "summary": "1763310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763310"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0101.json"
      }
    ],
    "title": "Red Hat Security Advisory: go-toolset-1.12-golang security update",
    "tracking": {
      "current_release_date": "2024-11-13T22:11:00+00:00",
      "generator": {
        "date": "2024-11-13T22:11:00+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHSA-2020:0101",
      "initial_release_date": "2020-01-14T08:45:49+00:00",
      "revision_history": [
        {
          "date": "2020-01-14T08:45:49+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-01-14T08:45:49+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-13T22:11:00+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-DevTools-2019.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:devtools:2019"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-DevTools-2019.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:devtools:2019"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Developer Tools"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-bin@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-misc@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-race@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-src@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-tests@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-build@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-runtime@1.12.12-4.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
                "product": {
                  "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
                  "product_id": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang@1.12.12-4.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-0:1.12.12-4.el7.src",
                "product": {
                  "name": "go-toolset-1.12-0:1.12.12-4.el7.src",
                  "product_id": "go-toolset-1.12-0:1.12.12-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12@1.12.12-4.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
                "product": {
                  "name": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
                  "product_id": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-docs@1.12.12-4.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-bin@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-misc@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-src@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-tests@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-build@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-runtime@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-bin@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-misc@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-src@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-tests@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-build@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-runtime@1.12.12-4.el7?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.src",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch"
        },
        "product_reference": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.src",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch"
        },
        "product_reference": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-01-14T08:45:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0101"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    },
    {
      "cve": "CVE-2019-17596",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "discovery_date": "2019-10-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1763310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: invalid public key causes panic in dsa.Verify",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "RHBZ#1763310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17596",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17596",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ"
        }
      ],
      "release_date": "2019-10-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-01-14T08:45:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0101"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: invalid public key causes panic in dsa.Verify"
    }
  ]
}
  rhba-2020:0062
Vulnerability from csaf_redhat
Published
2020-01-23 11:03
    Modified
2025-10-15 11:13
    Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3 image release advisory
    Notes
Topic
Red Hat OpenShift Container Platform release 4.3.0, which fixes several bugs and includes various enhancements, is now available.
    Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat
OpenShift Container Platform 4.3.0. See the following advisory for the
RPM packages for this release:
https://access.redhat.com/errata/RHBA-2020:0063
Space precludes documenting all of the bug fixes and enhancements in this
advisory, as well as all of the container images in this advisory. See the
following Release Notes documentation, which will be updated shortly for
this release, for details about these changes:
https://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-release-notes.html
You may download the oc tool and use it to inspect release image metadata as follows:
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.3.0-x86_64
The image digest is sha256:3a516480dfd68e0f87f702b4d7bdd6f6a0acfdac5cd2e9767b838ceede34d70d
All OpenShift Container Platform 4.3 users are advised to upgrade to these
updated packages and images.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat OpenShift Container Platform release 4.3.0, which fixes several bugs and includes various enhancements, is now available.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat\nOpenShift Container Platform 4.3.0. See the following advisory for the\nRPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2020:0063\n\nSpace precludes documenting all of the bug fixes and enhancements in this\nadvisory, as well as all of the container images in this advisory. See the\nfollowing Release Notes documentation, which will be updated shortly for\nthis release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-release-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata as follows:\n\n$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.3.0-x86_64\n\nThe image digest is sha256:3a516480dfd68e0f87f702b4d7bdd6f6a0acfdac5cd2e9767b838ceede34d70d\n\nAll OpenShift Container Platform 4.3 users are advised to upgrade to these\nupdated packages and images.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2020:0062",
        "url": "https://access.redhat.com/errata/RHBA-2020:0062"
      },
      {
        "category": "external",
        "summary": "1540560",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540560"
      },
      {
        "category": "external",
        "summary": "1542325",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542325"
      },
      {
        "category": "external",
        "summary": "1619479",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619479"
      },
      {
        "category": "external",
        "summary": "1665368",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665368"
      },
      {
        "category": "external",
        "summary": "1665828",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665828"
      },
      {
        "category": "external",
        "summary": "1674407",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1674407"
      },
      {
        "category": "external",
        "summary": "1683057",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683057"
      },
      {
        "category": "external",
        "summary": "1684079",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1684079"
      },
      {
        "category": "external",
        "summary": "1685189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685189"
      },
      {
        "category": "external",
        "summary": "1685338",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685338"
      },
      {
        "category": "external",
        "summary": "1688613",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688613"
      },
      {
        "category": "external",
        "summary": "1690588",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690588"
      },
      {
        "category": "external",
        "summary": "1691190",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691190"
      },
      {
        "category": "external",
        "summary": "1692227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692227"
      },
      {
        "category": "external",
        "summary": "1693169",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693169"
      },
      {
        "category": "external",
        "summary": "1698829",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698829"
      },
      {
        "category": "external",
        "summary": "1701495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701495"
      },
      {
        "category": "external",
        "summary": "1704961",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704961"
      },
      {
        "category": "external",
        "summary": "1706103",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1706103"
      },
      {
        "category": "external",
        "summary": "1707006",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707006"
      },
      {
        "category": "external",
        "summary": "1707403",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707403"
      },
      {
        "category": "external",
        "summary": "1707785",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707785"
      },
      {
        "category": "external",
        "summary": "1707905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707905"
      },
      {
        "category": "external",
        "summary": "1710939",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710939"
      },
      {
        "category": "external",
        "summary": "1711535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711535"
      },
      {
        "category": "external",
        "summary": "1711538",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711538"
      },
      {
        "category": "external",
        "summary": "1711544",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711544"
      },
      {
        "category": "external",
        "summary": "1711600",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711600"
      },
      {
        "category": "external",
        "summary": "1712068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712068"
      },
      {
        "category": "external",
        "summary": "1712697",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712697"
      },
      {
        "category": "external",
        "summary": "1713134",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713134"
      },
      {
        "category": "external",
        "summary": "1713193",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713193"
      },
      {
        "category": "external",
        "summary": "1713263",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713263"
      },
      {
        "category": "external",
        "summary": "1715001",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715001"
      },
      {
        "category": "external",
        "summary": "1716550",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716550"
      },
      {
        "category": "external",
        "summary": "1717255",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717255"
      },
      {
        "category": "external",
        "summary": "1717461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717461"
      },
      {
        "category": "external",
        "summary": "1722811",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722811"
      },
      {
        "category": "external",
        "summary": "1722878",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722878"
      },
      {
        "category": "external",
        "summary": "1723248",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723248"
      },
      {
        "category": "external",
        "summary": "1723254",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723254"
      },
      {
        "category": "external",
        "summary": "1723400",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723400"
      },
      {
        "category": "external",
        "summary": "1723948",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723948"
      },
      {
        "category": "external",
        "summary": "1723955",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723955"
      },
      {
        "category": "external",
        "summary": "1725006",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725006"
      },
      {
        "category": "external",
        "summary": "1725517",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725517"
      },
      {
        "category": "external",
        "summary": "1725977",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725977"
      },
      {
        "category": "external",
        "summary": "1727781",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727781"
      },
      {
        "category": "external",
        "summary": "1730401",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730401"
      },
      {
        "category": "external",
        "summary": "1731228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731228"
      },
      {
        "category": "external",
        "summary": "1731480",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731480"
      },
      {
        "category": "external",
        "summary": "1733594",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733594"
      },
      {
        "category": "external",
        "summary": "1734029",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734029"
      },
      {
        "category": "external",
        "summary": "1734270",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734270"
      },
      {
        "category": "external",
        "summary": "1734319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734319"
      },
      {
        "category": "external",
        "summary": "1734539",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734539"
      },
      {
        "category": "external",
        "summary": "1735509",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735509"
      },
      {
        "category": "external",
        "summary": "1735548",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735548"
      },
      {
        "category": "external",
        "summary": "1735691",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735691"
      },
      {
        "category": "external",
        "summary": "1736254",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1736254"
      },
      {
        "category": "external",
        "summary": "1736793",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1736793"
      },
      {
        "category": "external",
        "summary": "1736806",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1736806"
      },
      {
        "category": "external",
        "summary": "1737097",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737097"
      },
      {
        "category": "external",
        "summary": "1737392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737392"
      },
      {
        "category": "external",
        "summary": "1737630",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737630"
      },
      {
        "category": "external",
        "summary": "1738360",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738360"
      },
      {
        "category": "external",
        "summary": "1738374",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738374"
      },
      {
        "category": "external",
        "summary": "1739375",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739375"
      },
      {
        "category": "external",
        "summary": "1739447",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739447"
      },
      {
        "category": "external",
        "summary": "1740357",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740357"
      },
      {
        "category": "external",
        "summary": "1740374",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740374"
      },
      {
        "category": "external",
        "summary": "1740375",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740375"
      },
      {
        "category": "external",
        "summary": "1741120",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741120"
      },
      {
        "category": "external",
        "summary": "1741265",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741265"
      },
      {
        "category": "external",
        "summary": "1741391",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741391"
      },
      {
        "category": "external",
        "summary": "1741685",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741685"
      },
      {
        "category": "external",
        "summary": "1743459",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743459"
      },
      {
        "category": "external",
        "summary": "1743514",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743514"
      },
      {
        "category": "external",
        "summary": "1743938",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743938"
      },
      {
        "category": "external",
        "summary": "1744046",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744046"
      },
      {
        "category": "external",
        "summary": "1744462",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744462"
      },
      {
        "category": "external",
        "summary": "1744909",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744909"
      },
      {
        "category": "external",
        "summary": "1745028",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745028"
      },
      {
        "category": "external",
        "summary": "1751654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751654"
      },
      {
        "category": "external",
        "summary": "1745102",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745102"
      },
      {
        "category": "external",
        "summary": "1745192",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745192"
      },
      {
        "category": "external",
        "summary": "1745671",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745671"
      },
      {
        "category": "external",
        "summary": "1745773",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745773"
      },
      {
        "category": "external",
        "summary": "1745910",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745910"
      },
      {
        "category": "external",
        "summary": "1746222",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746222"
      },
      {
        "category": "external",
        "summary": "1746406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746406"
      },
      {
        "category": "external",
        "summary": "1746854",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746854"
      },
      {
        "category": "external",
        "summary": "1746871",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746871"
      },
      {
        "category": "external",
        "summary": "1748452",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748452"
      },
      {
        "category": "external",
        "summary": "1748478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748478"
      },
      {
        "category": "external",
        "summary": "1748777",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748777"
      },
      {
        "category": "external",
        "summary": "1749144",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749144"
      },
      {
        "category": "external",
        "summary": "1749256",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749256"
      },
      {
        "category": "external",
        "summary": "1749910",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749910"
      },
      {
        "category": "external",
        "summary": "1750494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750494"
      },
      {
        "category": "external",
        "summary": "1750675",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750675"
      },
      {
        "category": "external",
        "summary": "1750890",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750890"
      },
      {
        "category": "external",
        "summary": "1751124",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751124"
      },
      {
        "category": "external",
        "summary": "1751246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751246"
      },
      {
        "category": "external",
        "summary": "1751458",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751458"
      },
      {
        "category": "external",
        "summary": "1751513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751513"
      },
      {
        "category": "external",
        "summary": "1751602",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751602"
      },
      {
        "category": "external",
        "summary": "1751640",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751640"
      },
      {
        "category": "external",
        "summary": "1751641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751641"
      },
      {
        "category": "external",
        "summary": "1751756",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751756"
      },
      {
        "category": "external",
        "summary": "1751820",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751820"
      },
      {
        "category": "external",
        "summary": "1752045",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752045"
      },
      {
        "category": "external",
        "summary": "1752144",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752144"
      },
      {
        "category": "external",
        "summary": "1752222",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752222"
      },
      {
        "category": "external",
        "summary": "1752636",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752636"
      },
      {
        "category": "external",
        "summary": "1752646",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752646"
      },
      {
        "category": "external",
        "summary": "1752744",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752744"
      },
      {
        "category": "external",
        "summary": "1752929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752929"
      },
      {
        "category": "external",
        "summary": "1753059",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753059"
      },
      {
        "category": "external",
        "summary": "1753067",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753067"
      },
      {
        "category": "external",
        "summary": "1753124",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753124"
      },
      {
        "category": "external",
        "summary": "1753187",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753187"
      },
      {
        "category": "external",
        "summary": "1753216",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753216"
      },
      {
        "category": "external",
        "summary": "1753232",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753232"
      },
      {
        "category": "external",
        "summary": "1753265",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753265"
      },
      {
        "category": "external",
        "summary": "1753419",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753419"
      },
      {
        "category": "external",
        "summary": "1753467",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753467"
      },
      {
        "category": "external",
        "summary": "1753472",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753472"
      },
      {
        "category": "external",
        "summary": "1753568",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753568"
      },
      {
        "category": "external",
        "summary": "1753618",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753618"
      },
      {
        "category": "external",
        "summary": "1753688",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753688"
      },
      {
        "category": "external",
        "summary": "1753731",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753731"
      },
      {
        "category": "external",
        "summary": "1753734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753734"
      },
      {
        "category": "external",
        "summary": "1753778",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753778"
      },
      {
        "category": "external",
        "summary": "1753812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753812"
      },
      {
        "category": "external",
        "summary": "1753884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753884"
      },
      {
        "category": "external",
        "summary": "1753930",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753930"
      },
      {
        "category": "external",
        "summary": "1753936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753936"
      },
      {
        "category": "external",
        "summary": "1753953",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753953"
      },
      {
        "category": "external",
        "summary": "1754042",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754042"
      },
      {
        "category": "external",
        "summary": "1754049",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754049"
      },
      {
        "category": "external",
        "summary": "1754070",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754070"
      },
      {
        "category": "external",
        "summary": "1754154",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754154"
      },
      {
        "category": "external",
        "summary": "1754412",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754412"
      },
      {
        "category": "external",
        "summary": "1754452",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754452"
      },
      {
        "category": "external",
        "summary": "1754542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754542"
      },
      {
        "category": "external",
        "summary": "1754569",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754569"
      },
      {
        "category": "external",
        "summary": "1754592",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754592"
      },
      {
        "category": "external",
        "summary": "1754631",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754631"
      },
      {
        "category": "external",
        "summary": "1754640",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754640"
      },
      {
        "category": "external",
        "summary": "1754644",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754644"
      },
      {
        "category": "external",
        "summary": "1754647",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754647"
      },
      {
        "category": "external",
        "summary": "1754682",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754682"
      },
      {
        "category": "external",
        "summary": "1754738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754738"
      },
      {
        "category": "external",
        "summary": "1754789",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754789"
      },
      {
        "category": "external",
        "summary": "1754840",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754840"
      },
      {
        "category": "external",
        "summary": "1754939",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754939"
      },
      {
        "category": "external",
        "summary": "1755000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755000"
      },
      {
        "category": "external",
        "summary": "1755115",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755115"
      },
      {
        "category": "external",
        "summary": "1755130",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755130"
      },
      {
        "category": "external",
        "summary": "1755240",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755240"
      },
      {
        "category": "external",
        "summary": "1755383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755383"
      },
      {
        "category": "external",
        "summary": "1755469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755469"
      },
      {
        "category": "external",
        "summary": "1755552",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755552"
      },
      {
        "category": "external",
        "summary": "1755560",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755560"
      },
      {
        "category": "external",
        "summary": "1755606",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755606"
      },
      {
        "category": "external",
        "summary": "1755699",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755699"
      },
      {
        "category": "external",
        "summary": "1755784",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755784"
      },
      {
        "category": "external",
        "summary": "1755812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755812"
      },
      {
        "category": "external",
        "summary": "1755936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755936"
      },
      {
        "category": "external",
        "summary": "1755991",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755991"
      },
      {
        "category": "external",
        "summary": "1756107",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756107"
      },
      {
        "category": "external",
        "summary": "1756108",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756108"
      },
      {
        "category": "external",
        "summary": "1756132",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756132"
      },
      {
        "category": "external",
        "summary": "1756189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756189"
      },
      {
        "category": "external",
        "summary": "1756298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756298"
      },
      {
        "category": "external",
        "summary": "1756302",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756302"
      },
      {
        "category": "external",
        "summary": "1756312",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756312"
      },
      {
        "category": "external",
        "summary": "1756319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756319"
      },
      {
        "category": "external",
        "summary": "1756344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756344"
      },
      {
        "category": "external",
        "summary": "1756417",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756417"
      },
      {
        "category": "external",
        "summary": "1756421",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756421"
      },
      {
        "category": "external",
        "summary": "1756442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756442"
      },
      {
        "category": "external",
        "summary": "1756453",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756453"
      },
      {
        "category": "external",
        "summary": "1756461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756461"
      },
      {
        "category": "external",
        "summary": "1756471",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756471"
      },
      {
        "category": "external",
        "summary": "1756475",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756475"
      },
      {
        "category": "external",
        "summary": "1756500",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756500"
      },
      {
        "category": "external",
        "summary": "1756542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756542"
      },
      {
        "category": "external",
        "summary": "1756548",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756548"
      },
      {
        "category": "external",
        "summary": "1756669",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756669"
      },
      {
        "category": "external",
        "summary": "1756981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756981"
      },
      {
        "category": "external",
        "summary": "1757099",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757099"
      },
      {
        "category": "external",
        "summary": "1757110",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757110"
      },
      {
        "category": "external",
        "summary": "1757141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757141"
      },
      {
        "category": "external",
        "summary": "1757319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757319"
      },
      {
        "category": "external",
        "summary": "1757424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757424"
      },
      {
        "category": "external",
        "summary": "1757503",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757503"
      },
      {
        "category": "external",
        "summary": "1757526",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757526"
      },
      {
        "category": "external",
        "summary": "1757547",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757547"
      },
      {
        "category": "external",
        "summary": "1757752",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757752"
      },
      {
        "category": "external",
        "summary": "1757777",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757777"
      },
      {
        "category": "external",
        "summary": "1757836",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757836"
      },
      {
        "category": "external",
        "summary": "1757973",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757973"
      },
      {
        "category": "external",
        "summary": "1757975",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757975"
      },
      {
        "category": "external",
        "summary": "1758008",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758008"
      },
      {
        "category": "external",
        "summary": "1758031",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758031"
      },
      {
        "category": "external",
        "summary": "1758091",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758091"
      },
      {
        "category": "external",
        "summary": "1758306",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758306"
      },
      {
        "category": "external",
        "summary": "1758343",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758343"
      },
      {
        "category": "external",
        "summary": "1758434",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758434"
      },
      {
        "category": "external",
        "summary": "1758500",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758500"
      },
      {
        "category": "external",
        "summary": "1758528",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758528"
      },
      {
        "category": "external",
        "summary": "1758543",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758543"
      },
      {
        "category": "external",
        "summary": "1758606",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758606"
      },
      {
        "category": "external",
        "summary": "1758623",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758623"
      },
      {
        "category": "external",
        "summary": "1758628",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758628"
      },
      {
        "category": "external",
        "summary": "1758666",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758666"
      },
      {
        "category": "external",
        "summary": "1758687",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758687"
      },
      {
        "category": "external",
        "summary": "1759095",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759095"
      },
      {
        "category": "external",
        "summary": "1759169",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759169"
      },
      {
        "category": "external",
        "summary": "1759185",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759185"
      },
      {
        "category": "external",
        "summary": "1759248",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759248"
      },
      {
        "category": "external",
        "summary": "1759299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759299"
      },
      {
        "category": "external",
        "summary": "1759363",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759363"
      },
      {
        "category": "external",
        "summary": "1759469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759469"
      },
      {
        "category": "external",
        "summary": "1759487",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759487"
      },
      {
        "category": "external",
        "summary": "1759494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759494"
      },
      {
        "category": "external",
        "summary": "1759659",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759659"
      },
      {
        "category": "external",
        "summary": "1759880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759880"
      },
      {
        "category": "external",
        "summary": "1759920",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759920"
      },
      {
        "category": "external",
        "summary": "1759945",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759945"
      },
      {
        "category": "external",
        "summary": "1759965",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759965"
      },
      {
        "category": "external",
        "summary": "1759971",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759971"
      },
      {
        "category": "external",
        "summary": "1759984",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759984"
      },
      {
        "category": "external",
        "summary": "1759998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759998"
      },
      {
        "category": "external",
        "summary": "1760103",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760103"
      },
      {
        "category": "external",
        "summary": "1760393",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760393"
      },
      {
        "category": "external",
        "summary": "1760425",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760425"
      },
      {
        "category": "external",
        "summary": "1760478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760478"
      },
      {
        "category": "external",
        "summary": "1760479",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760479"
      },
      {
        "category": "external",
        "summary": "1760494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760494"
      },
      {
        "category": "external",
        "summary": "1760665",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760665"
      },
      {
        "category": "external",
        "summary": "1760787",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760787"
      },
      {
        "category": "external",
        "summary": "1760810",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760810"
      },
      {
        "category": "external",
        "summary": "1760827",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760827"
      },
      {
        "category": "external",
        "summary": "1760836",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760836"
      },
      {
        "category": "external",
        "summary": "1760858",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760858"
      },
      {
        "category": "external",
        "summary": "1761041",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761041"
      },
      {
        "category": "external",
        "summary": "1761049",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761049"
      },
      {
        "category": "external",
        "summary": "1761276",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761276"
      },
      {
        "category": "external",
        "summary": "1761344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761344"
      },
      {
        "category": "external",
        "summary": "1761348",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761348"
      },
      {
        "category": "external",
        "summary": "1761372",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761372"
      },
      {
        "category": "external",
        "summary": "1761505",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761505"
      },
      {
        "category": "external",
        "summary": "1761506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761506"
      },
      {
        "category": "external",
        "summary": "1761557",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761557"
      },
      {
        "category": "external",
        "summary": "1761682",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761682"
      },
      {
        "category": "external",
        "summary": "1761689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761689"
      },
      {
        "category": "external",
        "summary": "1761721",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761721"
      },
      {
        "category": "external",
        "summary": "1761815",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761815"
      },
      {
        "category": "external",
        "summary": "1761871",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761871"
      },
      {
        "category": "external",
        "summary": "1761921",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761921"
      },
      {
        "category": "external",
        "summary": "1761924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761924"
      },
      {
        "category": "external",
        "summary": "1761925",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761925"
      },
      {
        "category": "external",
        "summary": "1762137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762137"
      },
      {
        "category": "external",
        "summary": "1762145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762145"
      },
      {
        "category": "external",
        "summary": "1762149",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762149"
      },
      {
        "category": "external",
        "summary": "1762162",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762162"
      },
      {
        "category": "external",
        "summary": "1762217",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762217"
      },
      {
        "category": "external",
        "summary": "1762298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762298"
      },
      {
        "category": "external",
        "summary": "1762343",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762343"
      },
      {
        "category": "external",
        "summary": "1762413",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762413"
      },
      {
        "category": "external",
        "summary": "1762536",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762536"
      },
      {
        "category": "external",
        "summary": "1762614",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762614"
      },
      {
        "category": "external",
        "summary": "1762618",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762618"
      },
      {
        "category": "external",
        "summary": "1762653",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762653"
      },
      {
        "category": "external",
        "summary": "1762769",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762769"
      },
      {
        "category": "external",
        "summary": "1762787",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762787"
      },
      {
        "category": "external",
        "summary": "1762841",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762841"
      },
      {
        "category": "external",
        "summary": "1762868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762868"
      },
      {
        "category": "external",
        "summary": "1762888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762888"
      },
      {
        "category": "external",
        "summary": "1762968",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762968"
      },
      {
        "category": "external",
        "summary": "1762979",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762979"
      },
      {
        "category": "external",
        "summary": "1763005",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763005"
      },
      {
        "category": "external",
        "summary": "1763056",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763056"
      },
      {
        "category": "external",
        "summary": "1763078",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763078"
      },
      {
        "category": "external",
        "summary": "1763091",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763091"
      },
      {
        "category": "external",
        "summary": "1763278",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763278"
      },
      {
        "category": "external",
        "summary": "1763293",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763293"
      },
      {
        "category": "external",
        "summary": "1763303",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763303"
      },
      {
        "category": "external",
        "summary": "1763306",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763306"
      },
      {
        "category": "external",
        "summary": "1763341",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763341"
      },
      {
        "category": "external",
        "summary": "1763605",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763605"
      },
      {
        "category": "external",
        "summary": "1763635",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763635"
      },
      {
        "category": "external",
        "summary": "1763639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763639"
      },
      {
        "category": "external",
        "summary": "1763700",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763700"
      },
      {
        "category": "external",
        "summary": "1763725",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763725"
      },
      {
        "category": "external",
        "summary": "1763727",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763727"
      },
      {
        "category": "external",
        "summary": "1763728",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763728"
      },
      {
        "category": "external",
        "summary": "1763807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763807"
      },
      {
        "category": "external",
        "summary": "1763821",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763821"
      },
      {
        "category": "external",
        "summary": "1763836",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763836"
      },
      {
        "category": "external",
        "summary": "1763849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763849"
      },
      {
        "category": "external",
        "summary": "1763927",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763927"
      },
      {
        "category": "external",
        "summary": "1763929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763929"
      },
      {
        "category": "external",
        "summary": "1764017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764017"
      },
      {
        "category": "external",
        "summary": "1764076",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764076"
      },
      {
        "category": "external",
        "summary": "1764079",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764079"
      },
      {
        "category": "external",
        "summary": "1764081",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764081"
      },
      {
        "category": "external",
        "summary": "1764092",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764092"
      },
      {
        "category": "external",
        "summary": "1764216",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764216"
      },
      {
        "category": "external",
        "summary": "1764219",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764219"
      },
      {
        "category": "external",
        "summary": "1764224",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764224"
      },
      {
        "category": "external",
        "summary": "1764313",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764313"
      },
      {
        "category": "external",
        "summary": "1764323",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764323"
      },
      {
        "category": "external",
        "summary": "1764411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764411"
      },
      {
        "category": "external",
        "summary": "1764414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764414"
      },
      {
        "category": "external",
        "summary": "1764491",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764491"
      },
      {
        "category": "external",
        "summary": "1764498",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764498"
      },
      {
        "category": "external",
        "summary": "1764556",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764556"
      },
      {
        "category": "external",
        "summary": "1764558",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764558"
      },
      {
        "category": "external",
        "summary": "1764704",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764704"
      },
      {
        "category": "external",
        "summary": "1764728",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764728"
      },
      {
        "category": "external",
        "summary": "1765009",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765009"
      },
      {
        "category": "external",
        "summary": "1765015",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765015"
      },
      {
        "category": "external",
        "summary": "1765068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765068"
      },
      {
        "category": "external",
        "summary": "1765083",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765083"
      },
      {
        "category": "external",
        "summary": "1765177",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765177"
      },
      {
        "category": "external",
        "summary": "1765219",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765219"
      },
      {
        "category": "external",
        "summary": "1765261",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765261"
      },
      {
        "category": "external",
        "summary": "1765269",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765269"
      },
      {
        "category": "external",
        "summary": "1765282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765282"
      },
      {
        "category": "external",
        "summary": "1765315",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765315"
      },
      {
        "category": "external",
        "summary": "1765427",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765427"
      },
      {
        "category": "external",
        "summary": "1765457",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765457"
      },
      {
        "category": "external",
        "summary": "1765458",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765458"
      },
      {
        "category": "external",
        "summary": "1765733",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765733"
      },
      {
        "category": "external",
        "summary": "1765738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765738"
      },
      {
        "category": "external",
        "summary": "1765749",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765749"
      },
      {
        "category": "external",
        "summary": "1765756",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765756"
      },
      {
        "category": "external",
        "summary": "1765803",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765803"
      },
      {
        "category": "external",
        "summary": "1766111",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766111"
      },
      {
        "category": "external",
        "summary": "1766141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766141"
      },
      {
        "category": "external",
        "summary": "1766181",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766181"
      },
      {
        "category": "external",
        "summary": "1766187",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766187"
      },
      {
        "category": "external",
        "summary": "1766339",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766339"
      },
      {
        "category": "external",
        "summary": "1766356",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766356"
      },
      {
        "category": "external",
        "summary": "1766446",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766446"
      },
      {
        "category": "external",
        "summary": "1766482",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766482"
      },
      {
        "category": "external",
        "summary": "1766513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766513"
      },
      {
        "category": "external",
        "summary": "1766587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766587"
      },
      {
        "category": "external",
        "summary": "1766607",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766607"
      },
      {
        "category": "external",
        "summary": "1766632",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766632"
      },
      {
        "category": "external",
        "summary": "1766638",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766638"
      },
      {
        "category": "external",
        "summary": "1766739",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766739"
      },
      {
        "category": "external",
        "summary": "1766747",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766747"
      },
      {
        "category": "external",
        "summary": "1766792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766792"
      },
      {
        "category": "external",
        "summary": "1766851",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766851"
      },
      {
        "category": "external",
        "summary": "1766856",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766856"
      },
      {
        "category": "external",
        "summary": "1766907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766907"
      },
      {
        "category": "external",
        "summary": "1766918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766918"
      },
      {
        "category": "external",
        "summary": "1766949",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766949"
      },
      {
        "category": "external",
        "summary": "1766984",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766984"
      },
      {
        "category": "external",
        "summary": "1767004",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767004"
      },
      {
        "category": "external",
        "summary": "1767014",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767014"
      },
      {
        "category": "external",
        "summary": "1767156",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767156"
      },
      {
        "category": "external",
        "summary": "1767163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767163"
      },
      {
        "category": "external",
        "summary": "1767218",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767218"
      },
      {
        "category": "external",
        "summary": "1767219",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767219"
      },
      {
        "category": "external",
        "summary": "1767295",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767295"
      },
      {
        "category": "external",
        "summary": "1767547",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767547"
      },
      {
        "category": "external",
        "summary": "1767629",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767629"
      },
      {
        "category": "external",
        "summary": "1767675",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767675"
      },
      {
        "category": "external",
        "summary": "1767853",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767853"
      },
      {
        "category": "external",
        "summary": "1767926",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767926"
      },
      {
        "category": "external",
        "summary": "1767954",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767954"
      },
      {
        "category": "external",
        "summary": "1767964",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767964"
      },
      {
        "category": "external",
        "summary": "1768002",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768002"
      },
      {
        "category": "external",
        "summary": "1768262",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768262"
      },
      {
        "category": "external",
        "summary": "1768298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768298"
      },
      {
        "category": "external",
        "summary": "1768315",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768315"
      },
      {
        "category": "external",
        "summary": "1768328",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768328"
      },
      {
        "category": "external",
        "summary": "1768333",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768333"
      },
      {
        "category": "external",
        "summary": "1768341",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768341"
      },
      {
        "category": "external",
        "summary": "1768346",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768346"
      },
      {
        "category": "external",
        "summary": "1768350",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768350"
      },
      {
        "category": "external",
        "summary": "1768357",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768357"
      },
      {
        "category": "external",
        "summary": "1768359",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768359"
      },
      {
        "category": "external",
        "summary": "1768417",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768417"
      },
      {
        "category": "external",
        "summary": "1768442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768442"
      },
      {
        "category": "external",
        "summary": "1768474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768474"
      },
      {
        "category": "external",
        "summary": "1768483",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768483"
      },
      {
        "category": "external",
        "summary": "1768492",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768492"
      },
      {
        "category": "external",
        "summary": "1768507",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768507"
      },
      {
        "category": "external",
        "summary": "1768516",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768516"
      },
      {
        "category": "external",
        "summary": "1768537",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768537"
      },
      {
        "category": "external",
        "summary": "1768542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768542"
      },
      {
        "category": "external",
        "summary": "1768936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768936"
      },
      {
        "category": "external",
        "summary": "1768564",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768564"
      },
      {
        "category": "external",
        "summary": "1768568",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768568"
      },
      {
        "category": "external",
        "summary": "1768599",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768599"
      },
      {
        "category": "external",
        "summary": "1768611",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768611"
      },
      {
        "category": "external",
        "summary": "1768614",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768614"
      },
      {
        "category": "external",
        "summary": "1768616",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768616"
      },
      {
        "category": "external",
        "summary": "1768639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768639"
      },
      {
        "category": "external",
        "summary": "1768654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768654"
      },
      {
        "category": "external",
        "summary": "1768662",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768662"
      },
      {
        "category": "external",
        "summary": "1768684",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768684"
      },
      {
        "category": "external",
        "summary": "1768685",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768685"
      },
      {
        "category": "external",
        "summary": "1768688",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768688"
      },
      {
        "category": "external",
        "summary": "1768701",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768701"
      },
      {
        "category": "external",
        "summary": "1768716",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768716"
      },
      {
        "category": "external",
        "summary": "1768723",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768723"
      },
      {
        "category": "external",
        "summary": "1768765",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768765"
      },
      {
        "category": "external",
        "summary": "1768769",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768769"
      },
      {
        "category": "external",
        "summary": "1768771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768771"
      },
      {
        "category": "external",
        "summary": "1768782",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768782"
      },
      {
        "category": "external",
        "summary": "1768814",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768814"
      },
      {
        "category": "external",
        "summary": "1768820",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768820"
      },
      {
        "category": "external",
        "summary": "1768877",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768877"
      },
      {
        "category": "external",
        "summary": "1768905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768905"
      },
      {
        "category": "external",
        "summary": "1768926",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768926"
      },
      {
        "category": "external",
        "summary": "1768938",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768938"
      },
      {
        "category": "external",
        "summary": "1769005",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769005"
      },
      {
        "category": "external",
        "summary": "1769011",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769011"
      },
      {
        "category": "external",
        "summary": "1769012",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769012"
      },
      {
        "category": "external",
        "summary": "1769013",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769013"
      },
      {
        "category": "external",
        "summary": "1769016",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769016"
      },
      {
        "category": "external",
        "summary": "1769017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769017"
      },
      {
        "category": "external",
        "summary": "1769076",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769076"
      },
      {
        "category": "external",
        "summary": "1769151",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769151"
      },
      {
        "category": "external",
        "summary": "1769157",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769157"
      },
      {
        "category": "external",
        "summary": "1769167",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769167"
      },
      {
        "category": "external",
        "summary": "1769174",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769174"
      },
      {
        "category": "external",
        "summary": "1769263",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769263"
      },
      {
        "category": "external",
        "summary": "1769303",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769303"
      },
      {
        "category": "external",
        "summary": "1769325",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769325"
      },
      {
        "category": "external",
        "summary": "1769331",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769331"
      },
      {
        "category": "external",
        "summary": "1769391",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769391"
      },
      {
        "category": "external",
        "summary": "1769395",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769395"
      },
      {
        "category": "external",
        "summary": "1769412",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769412"
      },
      {
        "category": "external",
        "summary": "1769422",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769422"
      },
      {
        "category": "external",
        "summary": "1769435",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769435"
      },
      {
        "category": "external",
        "summary": "1769455",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769455"
      },
      {
        "category": "external",
        "summary": "1769468",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769468"
      },
      {
        "category": "external",
        "summary": "1769578",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769578"
      },
      {
        "category": "external",
        "summary": "1769585",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769585"
      },
      {
        "category": "external",
        "summary": "1769601",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769601"
      },
      {
        "category": "external",
        "summary": "1769602",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769602"
      },
      {
        "category": "external",
        "summary": "1769609",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769609"
      },
      {
        "category": "external",
        "summary": "1769612",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769612"
      },
      {
        "category": "external",
        "summary": "1769615",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769615"
      },
      {
        "category": "external",
        "summary": "1769641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769641"
      },
      {
        "category": "external",
        "summary": "1769645",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769645"
      },
      {
        "category": "external",
        "summary": "1769647",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769647"
      },
      {
        "category": "external",
        "summary": "1769700",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769700"
      },
      {
        "category": "external",
        "summary": "1769704",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769704"
      },
      {
        "category": "external",
        "summary": "1769742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769742"
      },
      {
        "category": "external",
        "summary": "1769768",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769768"
      },
      {
        "category": "external",
        "summary": "1769779",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769779"
      },
      {
        "category": "external",
        "summary": "1769793",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769793"
      },
      {
        "category": "external",
        "summary": "1769807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769807"
      },
      {
        "category": "external",
        "summary": "1769915",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769915"
      },
      {
        "category": "external",
        "summary": "1769949",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769949"
      },
      {
        "category": "external",
        "summary": "1769962",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769962"
      },
      {
        "category": "external",
        "summary": "1769985",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769985"
      },
      {
        "category": "external",
        "summary": "1770003",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770003"
      },
      {
        "category": "external",
        "summary": "1770006",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770006"
      },
      {
        "category": "external",
        "summary": "1770084",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770084"
      },
      {
        "category": "external",
        "summary": "1770101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770101"
      },
      {
        "category": "external",
        "summary": "1770108",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770108"
      },
      {
        "category": "external",
        "summary": "1770109",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770109"
      },
      {
        "category": "external",
        "summary": "1770144",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770144"
      },
      {
        "category": "external",
        "summary": "1770152",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770152"
      },
      {
        "category": "external",
        "summary": "1770269",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770269"
      },
      {
        "category": "external",
        "summary": "1770273",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770273"
      },
      {
        "category": "external",
        "summary": "1770348",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770348"
      },
      {
        "category": "external",
        "summary": "1770387",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770387"
      },
      {
        "category": "external",
        "summary": "1770406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770406"
      },
      {
        "category": "external",
        "summary": "1770441",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770441"
      },
      {
        "category": "external",
        "summary": "1770573",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770573"
      },
      {
        "category": "external",
        "summary": "1770642",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770642"
      },
      {
        "category": "external",
        "summary": "1770654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770654"
      },
      {
        "category": "external",
        "summary": "1770655",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770655"
      },
      {
        "category": "external",
        "summary": "1770665",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770665"
      },
      {
        "category": "external",
        "summary": "1770709",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770709"
      },
      {
        "category": "external",
        "summary": "1770724",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770724"
      },
      {
        "category": "external",
        "summary": "1770749",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770749"
      },
      {
        "category": "external",
        "summary": "1770757",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770757"
      },
      {
        "category": "external",
        "summary": "1770808",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770808"
      },
      {
        "category": "external",
        "summary": "1770903",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770903"
      },
      {
        "category": "external",
        "summary": "1770970",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770970"
      },
      {
        "category": "external",
        "summary": "1771003",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771003"
      },
      {
        "category": "external",
        "summary": "1771017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771017"
      },
      {
        "category": "external",
        "summary": "1771172",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771172"
      },
      {
        "category": "external",
        "summary": "1771233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771233"
      },
      {
        "category": "external",
        "summary": "1771245",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771245"
      },
      {
        "category": "external",
        "summary": "1771249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771249"
      },
      {
        "category": "external",
        "summary": "1771273",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771273"
      },
      {
        "category": "external",
        "summary": "1771321",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771321"
      },
      {
        "category": "external",
        "summary": "1771335",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771335"
      },
      {
        "category": "external",
        "summary": "1771355",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771355"
      },
      {
        "category": "external",
        "summary": "1771389",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771389"
      },
      {
        "category": "external",
        "summary": "1771431",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771431"
      },
      {
        "category": "external",
        "summary": "1771522",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771522"
      },
      {
        "category": "external",
        "summary": "1771736",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771736"
      },
      {
        "category": "external",
        "summary": "1771744",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771744"
      },
      {
        "category": "external",
        "summary": "1771783",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771783"
      },
      {
        "category": "external",
        "summary": "1771784",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771784"
      },
      {
        "category": "external",
        "summary": "1771813",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771813"
      },
      {
        "category": "external",
        "summary": "1771843",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771843"
      },
      {
        "category": "external",
        "summary": "1771850",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771850"
      },
      {
        "category": "external",
        "summary": "1771851",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771851"
      },
      {
        "category": "external",
        "summary": "1771919",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771919"
      },
      {
        "category": "external",
        "summary": "1771931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771931"
      },
      {
        "category": "external",
        "summary": "1771995",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771995"
      },
      {
        "category": "external",
        "summary": "1772000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772000"
      },
      {
        "category": "external",
        "summary": "1772340",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772340"
      },
      {
        "category": "external",
        "summary": "1772002",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772002"
      },
      {
        "category": "external",
        "summary": "1772049",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772049"
      },
      {
        "category": "external",
        "summary": "1772067",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772067"
      },
      {
        "category": "external",
        "summary": "1772080",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772080"
      },
      {
        "category": "external",
        "summary": "1772094",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772094"
      },
      {
        "category": "external",
        "summary": "1772154",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772154"
      },
      {
        "category": "external",
        "summary": "1772155",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772155"
      },
      {
        "category": "external",
        "summary": "1772163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772163"
      },
      {
        "category": "external",
        "summary": "1772190",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772190"
      },
      {
        "category": "external",
        "summary": "1772317",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772317"
      },
      {
        "category": "external",
        "summary": "1772346",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772346"
      },
      {
        "category": "external",
        "summary": "1772392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772392"
      },
      {
        "category": "external",
        "summary": "1772451",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772451"
      },
      {
        "category": "external",
        "summary": "1772455",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772455"
      },
      {
        "category": "external",
        "summary": "1772477",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772477"
      },
      {
        "category": "external",
        "summary": "1772502",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772502"
      },
      {
        "category": "external",
        "summary": "1772509",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772509"
      },
      {
        "category": "external",
        "summary": "1772599",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772599"
      },
      {
        "category": "external",
        "summary": "1772687",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772687"
      },
      {
        "category": "external",
        "summary": "1772767",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772767"
      },
      {
        "category": "external",
        "summary": "1772796",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772796"
      },
      {
        "category": "external",
        "summary": "1772804",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772804"
      },
      {
        "category": "external",
        "summary": "1772849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772849"
      },
      {
        "category": "external",
        "summary": "1772874",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772874"
      },
      {
        "category": "external",
        "summary": "1772900",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772900"
      },
      {
        "category": "external",
        "summary": "1772912",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772912"
      },
      {
        "category": "external",
        "summary": "1773243",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773243"
      },
      {
        "category": "external",
        "summary": "1773431",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773431"
      },
      {
        "category": "external",
        "summary": "1773480",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773480"
      },
      {
        "category": "external",
        "summary": "1773634",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773634"
      },
      {
        "category": "external",
        "summary": "1773661",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773661"
      },
      {
        "category": "external",
        "summary": "1773686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773686"
      },
      {
        "category": "external",
        "summary": "1773725",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773725"
      },
      {
        "category": "external",
        "summary": "1773727",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773727"
      },
      {
        "category": "external",
        "summary": "1773733",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773733"
      },
      {
        "category": "external",
        "summary": "1773847",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773847"
      },
      {
        "category": "external",
        "summary": "1773854",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773854"
      },
      {
        "category": "external",
        "summary": "1773995",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773995"
      },
      {
        "category": "external",
        "summary": "1774060",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774060"
      },
      {
        "category": "external",
        "summary": "1774173",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774173"
      },
      {
        "category": "external",
        "summary": "1774212",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774212"
      },
      {
        "category": "external",
        "summary": "1774352",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774352"
      },
      {
        "category": "external",
        "summary": "1774353",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774353"
      },
      {
        "category": "external",
        "summary": "1774369",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774369"
      },
      {
        "category": "external",
        "summary": "1774451",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774451"
      },
      {
        "category": "external",
        "summary": "1774589",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774589"
      },
      {
        "category": "external",
        "summary": "1774630",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774630"
      },
      {
        "category": "external",
        "summary": "1774642",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774642"
      },
      {
        "category": "external",
        "summary": "1774720",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774720"
      },
      {
        "category": "external",
        "summary": "1774813",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774813"
      },
      {
        "category": "external",
        "summary": "1774837",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774837"
      },
      {
        "category": "external",
        "summary": "1774841",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774841"
      },
      {
        "category": "external",
        "summary": "1774907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774907"
      },
      {
        "category": "external",
        "summary": "1774912",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774912"
      },
      {
        "category": "external",
        "summary": "1774917",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774917"
      },
      {
        "category": "external",
        "summary": "1774930",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774930"
      },
      {
        "category": "external",
        "summary": "1774936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774936"
      },
      {
        "category": "external",
        "summary": "1775009",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775009"
      },
      {
        "category": "external",
        "summary": "1775055",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775055"
      },
      {
        "category": "external",
        "summary": "1775119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775119"
      },
      {
        "category": "external",
        "summary": "1775131",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775131"
      },
      {
        "category": "external",
        "summary": "1775156",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775156"
      },
      {
        "category": "external",
        "summary": "1775170",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775170"
      },
      {
        "category": "external",
        "summary": "1775245",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775245"
      },
      {
        "category": "external",
        "summary": "1775279",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775279"
      },
      {
        "category": "external",
        "summary": "1775323",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775323"
      },
      {
        "category": "external",
        "summary": "1775379",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775379"
      },
      {
        "category": "external",
        "summary": "1775384",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775384"
      },
      {
        "category": "external",
        "summary": "1775527",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775527"
      },
      {
        "category": "external",
        "summary": "1775580",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775580"
      },
      {
        "category": "external",
        "summary": "1775643",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775643"
      },
      {
        "category": "external",
        "summary": "1775723",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775723"
      },
      {
        "category": "external",
        "summary": "1775730",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775730"
      },
      {
        "category": "external",
        "summary": "1775742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775742"
      },
      {
        "category": "external",
        "summary": "1775752",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775752"
      },
      {
        "category": "external",
        "summary": "1775826",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775826"
      },
      {
        "category": "external",
        "summary": "1775849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775849"
      },
      {
        "category": "external",
        "summary": "1775874",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775874"
      },
      {
        "category": "external",
        "summary": "1775878",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775878"
      },
      {
        "category": "external",
        "summary": "1776010",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776010"
      },
      {
        "category": "external",
        "summary": "1776043",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776043"
      },
      {
        "category": "external",
        "summary": "1776060",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776060"
      },
      {
        "category": "external",
        "summary": "1776135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776135"
      },
      {
        "category": "external",
        "summary": "1776189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776189"
      },
      {
        "category": "external",
        "summary": "1776193",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776193"
      },
      {
        "category": "external",
        "summary": "1776213",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776213"
      },
      {
        "category": "external",
        "summary": "1776295",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776295"
      },
      {
        "category": "external",
        "summary": "1776297",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776297"
      },
      {
        "category": "external",
        "summary": "1776305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776305"
      },
      {
        "category": "external",
        "summary": "1776311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776311"
      },
      {
        "category": "external",
        "summary": "1776339",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776339"
      },
      {
        "category": "external",
        "summary": "1776401",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776401"
      },
      {
        "category": "external",
        "summary": "1776421",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776421"
      },
      {
        "category": "external",
        "summary": "1776474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776474"
      },
      {
        "category": "external",
        "summary": "1776486",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776486"
      },
      {
        "category": "external",
        "summary": "1776493",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776493"
      },
      {
        "category": "external",
        "summary": "1776521",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776521"
      },
      {
        "category": "external",
        "summary": "1776533",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776533"
      },
      {
        "category": "external",
        "summary": "1776604",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776604"
      },
      {
        "category": "external",
        "summary": "1776660",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776660"
      },
      {
        "category": "external",
        "summary": "1776698",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776698"
      },
      {
        "category": "external",
        "summary": "1776700",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776700"
      },
      {
        "category": "external",
        "summary": "1776708",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776708"
      },
      {
        "category": "external",
        "summary": "1776759",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776759"
      },
      {
        "category": "external",
        "summary": "1776768",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776768"
      },
      {
        "category": "external",
        "summary": "1776773",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776773"
      },
      {
        "category": "external",
        "summary": "1776797",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776797"
      },
      {
        "category": "external",
        "summary": "1776812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776812"
      },
      {
        "category": "external",
        "summary": "1776867",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776867"
      },
      {
        "category": "external",
        "summary": "1776885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776885"
      },
      {
        "category": "external",
        "summary": "1776897",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776897"
      },
      {
        "category": "external",
        "summary": "1776914",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776914"
      },
      {
        "category": "external",
        "summary": "1776935",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776935"
      },
      {
        "category": "external",
        "summary": "1776990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776990"
      },
      {
        "category": "external",
        "summary": "1777036",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777036"
      },
      {
        "category": "external",
        "summary": "1777178",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777178"
      },
      {
        "category": "external",
        "summary": "1777205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777205"
      },
      {
        "category": "external",
        "summary": "1777229",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777229"
      },
      {
        "category": "external",
        "summary": "1777233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777233"
      },
      {
        "category": "external",
        "summary": "1777273",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777273"
      },
      {
        "category": "external",
        "summary": "1777281",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777281"
      },
      {
        "category": "external",
        "summary": "1777291",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777291"
      },
      {
        "category": "external",
        "summary": "1777388",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777388"
      },
      {
        "category": "external",
        "summary": "1777424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777424"
      },
      {
        "category": "external",
        "summary": "1777477",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777477"
      },
      {
        "category": "external",
        "summary": "1777513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777513"
      },
      {
        "category": "external",
        "summary": "1777517",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777517"
      },
      {
        "category": "external",
        "summary": "1777593",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777593"
      },
      {
        "category": "external",
        "summary": "1777732",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777732"
      },
      {
        "category": "external",
        "summary": "1777753",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777753"
      },
      {
        "category": "external",
        "summary": "1777776",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777776"
      },
      {
        "category": "external",
        "summary": "1777838",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777838"
      },
      {
        "category": "external",
        "summary": "1777970",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777970"
      },
      {
        "category": "external",
        "summary": "1778017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778017"
      },
      {
        "category": "external",
        "summary": "1778205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778205"
      },
      {
        "category": "external",
        "summary": "1778213",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778213"
      },
      {
        "category": "external",
        "summary": "1778312",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778312"
      },
      {
        "category": "external",
        "summary": "1778535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778535"
      },
      {
        "category": "external",
        "summary": "1778686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778686"
      },
      {
        "category": "external",
        "summary": "1778894",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778894"
      },
      {
        "category": "external",
        "summary": "1778904",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778904"
      },
      {
        "category": "external",
        "summary": "1778930",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778930"
      },
      {
        "category": "external",
        "summary": "1778940",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778940"
      },
      {
        "category": "external",
        "summary": "1778954",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778954"
      },
      {
        "category": "external",
        "summary": "1779101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779101"
      },
      {
        "category": "external",
        "summary": "1779189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779189"
      },
      {
        "category": "external",
        "summary": "1779191",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779191"
      },
      {
        "category": "external",
        "summary": "1779195",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779195"
      },
      {
        "category": "external",
        "summary": "1779222",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779222"
      },
      {
        "category": "external",
        "summary": "1779237",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779237"
      },
      {
        "category": "external",
        "summary": "1779316",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779316"
      },
      {
        "category": "external",
        "summary": "1779322",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779322"
      },
      {
        "category": "external",
        "summary": "1779329",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779329"
      },
      {
        "category": "external",
        "summary": "1779332",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779332"
      },
      {
        "category": "external",
        "summary": "1779348",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779348"
      },
      {
        "category": "external",
        "summary": "1779383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779383"
      },
      {
        "category": "external",
        "summary": "1779487",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779487"
      },
      {
        "category": "external",
        "summary": "1779491",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779491"
      },
      {
        "category": "external",
        "summary": "1779492",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779492"
      },
      {
        "category": "external",
        "summary": "1779524",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779524"
      },
      {
        "category": "external",
        "summary": "1779535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779535"
      },
      {
        "category": "external",
        "summary": "1779665",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779665"
      },
      {
        "category": "external",
        "summary": "1779679",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779679"
      },
      {
        "category": "external",
        "summary": "1779681",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779681"
      },
      {
        "category": "external",
        "summary": "1779741",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779741"
      },
      {
        "category": "external",
        "summary": "1780587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780587"
      },
      {
        "category": "external",
        "summary": "1779791",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779791"
      },
      {
        "category": "external",
        "summary": "1779831",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779831"
      },
      {
        "category": "external",
        "summary": "1779913",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779913"
      },
      {
        "category": "external",
        "summary": "1779915",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779915"
      },
      {
        "category": "external",
        "summary": "1779916",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779916"
      },
      {
        "category": "external",
        "summary": "1779956",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779956"
      },
      {
        "category": "external",
        "summary": "1779995",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779995"
      },
      {
        "category": "external",
        "summary": "1780142",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780142"
      },
      {
        "category": "external",
        "summary": "1780379",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780379"
      },
      {
        "category": "external",
        "summary": "1780384",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780384"
      },
      {
        "category": "external",
        "summary": "1780408",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780408"
      },
      {
        "category": "external",
        "summary": "1780509",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780509"
      },
      {
        "category": "external",
        "summary": "1780590",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780590"
      },
      {
        "category": "external",
        "summary": "1780736",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780736"
      },
      {
        "category": "external",
        "summary": "1780738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780738"
      },
      {
        "category": "external",
        "summary": "1780835",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780835"
      },
      {
        "category": "external",
        "summary": "1780843",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780843"
      },
      {
        "category": "external",
        "summary": "1780953",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780953"
      },
      {
        "category": "external",
        "summary": "1780982",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780982"
      },
      {
        "category": "external",
        "summary": "1780989",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780989"
      },
      {
        "category": "external",
        "summary": "1780994",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780994"
      },
      {
        "category": "external",
        "summary": "1781019",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781019"
      },
      {
        "category": "external",
        "summary": "1781037",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781037"
      },
      {
        "category": "external",
        "summary": "1781053",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781053"
      },
      {
        "category": "external",
        "summary": "1781083",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781083"
      },
      {
        "category": "external",
        "summary": "1781104",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781104"
      },
      {
        "category": "external",
        "summary": "1781105",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781105"
      },
      {
        "category": "external",
        "summary": "1781141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781141"
      },
      {
        "category": "external",
        "summary": "1781178",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781178"
      },
      {
        "category": "external",
        "summary": "1781193",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781193"
      },
      {
        "category": "external",
        "summary": "1781258",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781258"
      },
      {
        "category": "external",
        "summary": "1781284",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781284"
      },
      {
        "category": "external",
        "summary": "1781286",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781286"
      },
      {
        "category": "external",
        "summary": "1781290",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781290"
      },
      {
        "category": "external",
        "summary": "1781313",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781313"
      },
      {
        "category": "external",
        "summary": "1781330",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781330"
      },
      {
        "category": "external",
        "summary": "1781347",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781347"
      },
      {
        "category": "external",
        "summary": "1781558",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781558"
      },
      {
        "category": "external",
        "summary": "1781577",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781577"
      },
      {
        "category": "external",
        "summary": "1781678",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781678"
      },
      {
        "category": "external",
        "summary": "1781763",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781763"
      },
      {
        "category": "external",
        "summary": "1781795",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781795"
      },
      {
        "category": "external",
        "summary": "1781798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781798"
      },
      {
        "category": "external",
        "summary": "1781843",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781843"
      },
      {
        "category": "external",
        "summary": "1781869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781869"
      },
      {
        "category": "external",
        "summary": "1781950",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781950"
      },
      {
        "category": "external",
        "summary": "1782104",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782104"
      },
      {
        "category": "external",
        "summary": "1782119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782119"
      },
      {
        "category": "external",
        "summary": "1782124",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782124"
      },
      {
        "category": "external",
        "summary": "1782147",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782147"
      },
      {
        "category": "external",
        "summary": "1782149",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782149"
      },
      {
        "category": "external",
        "summary": "1782164",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782164"
      },
      {
        "category": "external",
        "summary": "1782176",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782176"
      },
      {
        "category": "external",
        "summary": "1782204",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782204"
      },
      {
        "category": "external",
        "summary": "1782224",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782224"
      },
      {
        "category": "external",
        "summary": "1782237",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782237"
      },
      {
        "category": "external",
        "summary": "1782312",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782312"
      },
      {
        "category": "external",
        "summary": "1782409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782409"
      },
      {
        "category": "external",
        "summary": "1782447",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782447"
      },
      {
        "category": "external",
        "summary": "1782546",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782546"
      },
      {
        "category": "external",
        "summary": "1782584",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782584"
      },
      {
        "category": "external",
        "summary": "1782728",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782728"
      },
      {
        "category": "external",
        "summary": "1782795",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782795"
      },
      {
        "category": "external",
        "summary": "1782817",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782817"
      },
      {
        "category": "external",
        "summary": "1782819",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782819"
      },
      {
        "category": "external",
        "summary": "1782829",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782829"
      },
      {
        "category": "external",
        "summary": "1782837",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782837"
      },
      {
        "category": "external",
        "summary": "1782860",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782860"
      },
      {
        "category": "external",
        "summary": "1782992",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782992"
      },
      {
        "category": "external",
        "summary": "1782997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782997"
      },
      {
        "category": "external",
        "summary": "1783009",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783009"
      },
      {
        "category": "external",
        "summary": "1783010",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783010"
      },
      {
        "category": "external",
        "summary": "1783011",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783011"
      },
      {
        "category": "external",
        "summary": "1783259",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783259"
      },
      {
        "category": "external",
        "summary": "1783353",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783353"
      },
      {
        "category": "external",
        "summary": "1783448",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783448"
      },
      {
        "category": "external",
        "summary": "1783587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783587"
      },
      {
        "category": "external",
        "summary": "1783732",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783732"
      },
      {
        "category": "external",
        "summary": "1783829",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783829"
      },
      {
        "category": "external",
        "summary": "1783846",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783846"
      },
      {
        "category": "external",
        "summary": "1783892",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783892"
      },
      {
        "category": "external",
        "summary": "1783974",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783974"
      },
      {
        "category": "external",
        "summary": "1784082",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784082"
      },
      {
        "category": "external",
        "summary": "1784086",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784086"
      },
      {
        "category": "external",
        "summary": "1784166",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784166"
      },
      {
        "category": "external",
        "summary": "1784319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784319"
      },
      {
        "category": "external",
        "summary": "1784440",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784440"
      },
      {
        "category": "external",
        "summary": "1784469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784469"
      },
      {
        "category": "external",
        "summary": "1784475",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784475"
      },
      {
        "category": "external",
        "summary": "1784500",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784500"
      },
      {
        "category": "external",
        "summary": "1784629",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784629"
      },
      {
        "category": "external",
        "summary": "1784880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784880"
      },
      {
        "category": "external",
        "summary": "1784915",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784915"
      },
      {
        "category": "external",
        "summary": "1784981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784981"
      },
      {
        "category": "external",
        "summary": "1785138",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785138"
      },
      {
        "category": "external",
        "summary": "1785310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785310"
      },
      {
        "category": "external",
        "summary": "1785419",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785419"
      },
      {
        "category": "external",
        "summary": "1785675",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785675"
      },
      {
        "category": "external",
        "summary": "1786141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786141"
      },
      {
        "category": "external",
        "summary": "1786300",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786300"
      },
      {
        "category": "external",
        "summary": "1786993",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786993"
      },
      {
        "category": "external",
        "summary": "1787334",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787334"
      },
      {
        "category": "external",
        "summary": "1787587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787587"
      },
      {
        "category": "external",
        "summary": "1788054",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788054"
      },
      {
        "category": "external",
        "summary": "1788118",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788118"
      },
      {
        "category": "external",
        "summary": "1788321",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788321"
      },
      {
        "category": "external",
        "summary": "1788442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788442"
      },
      {
        "category": "external",
        "summary": "1788580",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788580"
      },
      {
        "category": "external",
        "summary": "1788621",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788621"
      },
      {
        "category": "external",
        "summary": "1788704",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788704"
      },
      {
        "category": "external",
        "summary": "1789001",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789001"
      },
      {
        "category": "external",
        "summary": "1789014",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789014"
      },
      {
        "category": "external",
        "summary": "1789601",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789601"
      },
      {
        "category": "external",
        "summary": "1790329",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790329"
      },
      {
        "category": "external",
        "summary": "1791332",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791332"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_0062.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3 image release advisory",
    "tracking": {
      "current_release_date": "2025-10-15T11:13:17+00:00",
      "generator": {
        "date": "2025-10-15T11:13:17+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHBA-2020:0062",
      "initial_release_date": "2020-01-23T11:03:26+00:00",
      "revision_history": [
        {
          "date": "2020-01-23T11:03:26+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-01-23T11:03:26+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-15T11:13:17+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.3",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.3",
                  "product_id": "7Server-RH7-RHOSE-4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.3::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.3",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.3",
                  "product_id": "8Base-RHOSE-4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.3::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
                  "product_id": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
                  "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
                  "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
                  "product_id": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
                  "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
                  "product_id": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
                "product": {
                  "name": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
                  "product_id": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
                "product": {
                  "name": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
                  "product_id": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
                "product": {
                  "name": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
                  "product_id": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
                  "product_id": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
                  "product_id": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
                  "product_id": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
                "product": {
                  "name": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
                  "product_id": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
                  "product_id": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
                  "product_id": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-hardware-inventory-recorder-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
                  "product_id": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-inspector-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
                  "product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
                  "product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-machine-os-downloader-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
                  "product_id": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-static-ip-manager-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
                  "product_id": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
                "product": {
                  "name": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
                  "product_id": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
                "product": {
                  "name": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
                  "product_id": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
                "product": {
                  "name": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
                  "product_id": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
                "product": {
                  "name": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
                  "product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64",
                "product": {
                  "name": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64",
                  "product_id": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-controller-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
                "product": {
                  "name": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
                  "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
                "product": {
                  "name": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
                  "product_id": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
                "product": {
                  "name": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
                  "product_id": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
                "product": {
                  "name": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
                  "product_id": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
                "product": {
                  "name": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
                  "product_id": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
                "product": {
                  "name": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
                  "product_id": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
                "product": {
                  "name": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
                  "product_id": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
                "product": {
                  "name": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
                  "product_id": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
                "product": {
                  "name": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
                  "product_id": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
                "product": {
                  "name": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
                  "product_id": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
                "product": {
                  "name": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
                  "product_id": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
                "product": {
                  "name": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
                  "product_id": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
                "product": {
                  "name": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
                  "product_id": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
                "product": {
                  "name": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
                  "product_id": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
                  "product_id": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
                "product": {
                  "name": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
                  "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
                "product": {
                  "name": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
                  "product_id": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
                "product": {
                  "name": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
                  "product_id": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
                "product": {
                  "name": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
                  "product_id": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
                "product": {
                  "name": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
                  "product_id": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
                "product": {
                  "name": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
                  "product_id": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
                  "product_id": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
                  "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
                  "product_id": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
                  "product_id": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
                  "product_id": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
                  "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
                  "product_id": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
                  "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
                  "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
                  "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
                  "product_id": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
                  "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
                  "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
                  "product_id": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
                  "product_id": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
                  "product_id": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
                "product": {
                  "name": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
                  "product_id": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
                "product": {
                  "name": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
                  "product_id": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
                "product": {
                  "name": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
                  "product_id": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
                "product": {
                  "name": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
                  "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
                "product": {
                  "name": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
                  "product_id": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
                "product": {
                  "name": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
                  "product_id": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
                "product": {
                  "name": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
                  "product_id": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
                "product": {
                  "name": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
                  "product_id": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
                  "product_id": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel7\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
                  "product_id": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel7\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
                "product": {
                  "name": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
                  "product_id": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
                "product": {
                  "name": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
                  "product_id": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
                "product": {
                  "name": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
                  "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
                "product": {
                  "name": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
                  "product_id": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
                  "product_id": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
                  "product_id": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
                "product": {
                  "name": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
                  "product_id": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
                "product": {
                  "name": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
                  "product_id": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.3.0-202001211731"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64"
        },
        "product_reference": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64"
        },
        "product_reference": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64"
        },
        "product_reference": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64"
        },
        "product_reference": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64"
        },
        "product_reference": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64"
        },
        "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64"
        },
        "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64"
        },
        "product_reference": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64"
        },
        "product_reference": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64"
        },
        "product_reference": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64"
        },
        "product_reference": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64"
        },
        "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64"
        },
        "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64"
        },
        "product_reference": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64"
        },
        "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64"
        },
        "product_reference": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64"
        },
        "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64"
        },
        "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64"
        },
        "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64"
        },
        "product_reference": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64"
        },
        "product_reference": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64"
        },
        "product_reference": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64"
        },
        "product_reference": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64"
        },
        "product_reference": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64"
        },
        "product_reference": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64"
        },
        "product_reference": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64"
        },
        "product_reference": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64"
        },
        "product_reference": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64"
        },
        "product_reference": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64"
        },
        "product_reference": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64"
        },
        "product_reference": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64"
        },
        "product_reference": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64"
        },
        "product_reference": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64"
        },
        "product_reference": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64"
        },
        "product_reference": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64"
        },
        "product_reference": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64"
        },
        "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64"
        },
        "product_reference": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64"
        },
        "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64"
        },
        "product_reference": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64"
        },
        "product_reference": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64"
        },
        "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64"
        },
        "product_reference": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64"
        },
        "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64"
        },
        "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64"
        },
        "product_reference": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64"
        },
        "product_reference": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64"
        },
        "product_reference": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64"
        },
        "product_reference": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64"
        },
        "product_reference": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64"
        },
        "product_reference": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64"
        },
        "product_reference": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64"
        },
        "product_reference": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64"
        },
        "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64"
        },
        "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64"
        },
        "product_reference": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64"
        },
        "product_reference": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64"
        },
        "product_reference": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64"
        },
        "product_reference": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64"
        },
        "product_reference": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64"
        },
        "product_reference": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64"
        },
        "product_reference": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64"
        },
        "product_reference": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64"
        },
        "product_reference": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64"
        },
        "product_reference": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64"
        },
        "product_reference": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64"
        },
        "product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64"
        },
        "product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64"
        },
        "product_reference": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64"
        },
        "product_reference": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64"
        },
        "product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
        },
        "product_reference": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-11840",
      "cwe": {
        "id": "CWE-330",
        "name": "Use of Insufficiently Random Values"
      },
      "discovery_date": "2019-03-21T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1691529"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages. If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang.org/x/crypto: Keystream loop in amd64 assembly when overflowing 32-bit counter",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64"
        ],
        "known_not_affected": [
          "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-11840"
        },
        {
          "category": "external",
          "summary": "RHBZ#1691529",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691529"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11840",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-11840"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11840",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11840"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/tjyNcJxb2vQ/n0NRBziSCAAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/tjyNcJxb2vQ/n0NRBziSCAAJ"
        }
      ],
      "release_date": "2019-03-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-01-23T11:03:26+00:00",
          "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.",
          "product_ids": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2020:0062"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang.org/x/crypto: Keystream loop in amd64 assembly when overflowing 32-bit counter"
    },
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64"
        ],
        "known_not_affected": [
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-01-23T11:03:26+00:00",
          "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.",
          "product_ids": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2020:0062"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    }
  ]
}
  RHBA-2020:0062
Vulnerability from csaf_redhat
Published
2020-01-23 11:03
    Modified
2025-10-15 11:13
    Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3 image release advisory
    Notes
Topic
Red Hat OpenShift Container Platform release 4.3.0, which fixes several bugs and includes various enhancements, is now available.
    Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat
OpenShift Container Platform 4.3.0. See the following advisory for the
RPM packages for this release:
https://access.redhat.com/errata/RHBA-2020:0063
Space precludes documenting all of the bug fixes and enhancements in this
advisory, as well as all of the container images in this advisory. See the
following Release Notes documentation, which will be updated shortly for
this release, for details about these changes:
https://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-release-notes.html
You may download the oc tool and use it to inspect release image metadata as follows:
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.3.0-x86_64
The image digest is sha256:3a516480dfd68e0f87f702b4d7bdd6f6a0acfdac5cd2e9767b838ceede34d70d
All OpenShift Container Platform 4.3 users are advised to upgrade to these
updated packages and images.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat OpenShift Container Platform release 4.3.0, which fixes several bugs and includes various enhancements, is now available.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat\nOpenShift Container Platform 4.3.0. See the following advisory for the\nRPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2020:0063\n\nSpace precludes documenting all of the bug fixes and enhancements in this\nadvisory, as well as all of the container images in this advisory. See the\nfollowing Release Notes documentation, which will be updated shortly for\nthis release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-release-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata as follows:\n\n$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.3.0-x86_64\n\nThe image digest is sha256:3a516480dfd68e0f87f702b4d7bdd6f6a0acfdac5cd2e9767b838ceede34d70d\n\nAll OpenShift Container Platform 4.3 users are advised to upgrade to these\nupdated packages and images.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2020:0062",
        "url": "https://access.redhat.com/errata/RHBA-2020:0062"
      },
      {
        "category": "external",
        "summary": "1540560",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540560"
      },
      {
        "category": "external",
        "summary": "1542325",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542325"
      },
      {
        "category": "external",
        "summary": "1619479",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619479"
      },
      {
        "category": "external",
        "summary": "1665368",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665368"
      },
      {
        "category": "external",
        "summary": "1665828",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665828"
      },
      {
        "category": "external",
        "summary": "1674407",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1674407"
      },
      {
        "category": "external",
        "summary": "1683057",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683057"
      },
      {
        "category": "external",
        "summary": "1684079",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1684079"
      },
      {
        "category": "external",
        "summary": "1685189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685189"
      },
      {
        "category": "external",
        "summary": "1685338",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685338"
      },
      {
        "category": "external",
        "summary": "1688613",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688613"
      },
      {
        "category": "external",
        "summary": "1690588",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690588"
      },
      {
        "category": "external",
        "summary": "1691190",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691190"
      },
      {
        "category": "external",
        "summary": "1692227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692227"
      },
      {
        "category": "external",
        "summary": "1693169",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693169"
      },
      {
        "category": "external",
        "summary": "1698829",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698829"
      },
      {
        "category": "external",
        "summary": "1701495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701495"
      },
      {
        "category": "external",
        "summary": "1704961",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704961"
      },
      {
        "category": "external",
        "summary": "1706103",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1706103"
      },
      {
        "category": "external",
        "summary": "1707006",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707006"
      },
      {
        "category": "external",
        "summary": "1707403",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707403"
      },
      {
        "category": "external",
        "summary": "1707785",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707785"
      },
      {
        "category": "external",
        "summary": "1707905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707905"
      },
      {
        "category": "external",
        "summary": "1710939",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710939"
      },
      {
        "category": "external",
        "summary": "1711535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711535"
      },
      {
        "category": "external",
        "summary": "1711538",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711538"
      },
      {
        "category": "external",
        "summary": "1711544",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711544"
      },
      {
        "category": "external",
        "summary": "1711600",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711600"
      },
      {
        "category": "external",
        "summary": "1712068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712068"
      },
      {
        "category": "external",
        "summary": "1712697",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712697"
      },
      {
        "category": "external",
        "summary": "1713134",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713134"
      },
      {
        "category": "external",
        "summary": "1713193",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713193"
      },
      {
        "category": "external",
        "summary": "1713263",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713263"
      },
      {
        "category": "external",
        "summary": "1715001",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715001"
      },
      {
        "category": "external",
        "summary": "1716550",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716550"
      },
      {
        "category": "external",
        "summary": "1717255",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717255"
      },
      {
        "category": "external",
        "summary": "1717461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717461"
      },
      {
        "category": "external",
        "summary": "1722811",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722811"
      },
      {
        "category": "external",
        "summary": "1722878",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722878"
      },
      {
        "category": "external",
        "summary": "1723248",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723248"
      },
      {
        "category": "external",
        "summary": "1723254",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723254"
      },
      {
        "category": "external",
        "summary": "1723400",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723400"
      },
      {
        "category": "external",
        "summary": "1723948",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723948"
      },
      {
        "category": "external",
        "summary": "1723955",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723955"
      },
      {
        "category": "external",
        "summary": "1725006",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725006"
      },
      {
        "category": "external",
        "summary": "1725517",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725517"
      },
      {
        "category": "external",
        "summary": "1725977",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725977"
      },
      {
        "category": "external",
        "summary": "1727781",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727781"
      },
      {
        "category": "external",
        "summary": "1730401",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730401"
      },
      {
        "category": "external",
        "summary": "1731228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731228"
      },
      {
        "category": "external",
        "summary": "1731480",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731480"
      },
      {
        "category": "external",
        "summary": "1733594",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733594"
      },
      {
        "category": "external",
        "summary": "1734029",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734029"
      },
      {
        "category": "external",
        "summary": "1734270",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734270"
      },
      {
        "category": "external",
        "summary": "1734319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734319"
      },
      {
        "category": "external",
        "summary": "1734539",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734539"
      },
      {
        "category": "external",
        "summary": "1735509",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735509"
      },
      {
        "category": "external",
        "summary": "1735548",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735548"
      },
      {
        "category": "external",
        "summary": "1735691",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735691"
      },
      {
        "category": "external",
        "summary": "1736254",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1736254"
      },
      {
        "category": "external",
        "summary": "1736793",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1736793"
      },
      {
        "category": "external",
        "summary": "1736806",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1736806"
      },
      {
        "category": "external",
        "summary": "1737097",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737097"
      },
      {
        "category": "external",
        "summary": "1737392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737392"
      },
      {
        "category": "external",
        "summary": "1737630",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737630"
      },
      {
        "category": "external",
        "summary": "1738360",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738360"
      },
      {
        "category": "external",
        "summary": "1738374",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738374"
      },
      {
        "category": "external",
        "summary": "1739375",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739375"
      },
      {
        "category": "external",
        "summary": "1739447",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739447"
      },
      {
        "category": "external",
        "summary": "1740357",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740357"
      },
      {
        "category": "external",
        "summary": "1740374",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740374"
      },
      {
        "category": "external",
        "summary": "1740375",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740375"
      },
      {
        "category": "external",
        "summary": "1741120",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741120"
      },
      {
        "category": "external",
        "summary": "1741265",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741265"
      },
      {
        "category": "external",
        "summary": "1741391",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741391"
      },
      {
        "category": "external",
        "summary": "1741685",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741685"
      },
      {
        "category": "external",
        "summary": "1743459",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743459"
      },
      {
        "category": "external",
        "summary": "1743514",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743514"
      },
      {
        "category": "external",
        "summary": "1743938",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743938"
      },
      {
        "category": "external",
        "summary": "1744046",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744046"
      },
      {
        "category": "external",
        "summary": "1744462",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744462"
      },
      {
        "category": "external",
        "summary": "1744909",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744909"
      },
      {
        "category": "external",
        "summary": "1745028",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745028"
      },
      {
        "category": "external",
        "summary": "1751654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751654"
      },
      {
        "category": "external",
        "summary": "1745102",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745102"
      },
      {
        "category": "external",
        "summary": "1745192",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745192"
      },
      {
        "category": "external",
        "summary": "1745671",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745671"
      },
      {
        "category": "external",
        "summary": "1745773",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745773"
      },
      {
        "category": "external",
        "summary": "1745910",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745910"
      },
      {
        "category": "external",
        "summary": "1746222",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746222"
      },
      {
        "category": "external",
        "summary": "1746406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746406"
      },
      {
        "category": "external",
        "summary": "1746854",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746854"
      },
      {
        "category": "external",
        "summary": "1746871",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746871"
      },
      {
        "category": "external",
        "summary": "1748452",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748452"
      },
      {
        "category": "external",
        "summary": "1748478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748478"
      },
      {
        "category": "external",
        "summary": "1748777",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748777"
      },
      {
        "category": "external",
        "summary": "1749144",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749144"
      },
      {
        "category": "external",
        "summary": "1749256",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749256"
      },
      {
        "category": "external",
        "summary": "1749910",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749910"
      },
      {
        "category": "external",
        "summary": "1750494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750494"
      },
      {
        "category": "external",
        "summary": "1750675",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750675"
      },
      {
        "category": "external",
        "summary": "1750890",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750890"
      },
      {
        "category": "external",
        "summary": "1751124",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751124"
      },
      {
        "category": "external",
        "summary": "1751246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751246"
      },
      {
        "category": "external",
        "summary": "1751458",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751458"
      },
      {
        "category": "external",
        "summary": "1751513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751513"
      },
      {
        "category": "external",
        "summary": "1751602",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751602"
      },
      {
        "category": "external",
        "summary": "1751640",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751640"
      },
      {
        "category": "external",
        "summary": "1751641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751641"
      },
      {
        "category": "external",
        "summary": "1751756",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751756"
      },
      {
        "category": "external",
        "summary": "1751820",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751820"
      },
      {
        "category": "external",
        "summary": "1752045",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752045"
      },
      {
        "category": "external",
        "summary": "1752144",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752144"
      },
      {
        "category": "external",
        "summary": "1752222",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752222"
      },
      {
        "category": "external",
        "summary": "1752636",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752636"
      },
      {
        "category": "external",
        "summary": "1752646",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752646"
      },
      {
        "category": "external",
        "summary": "1752744",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752744"
      },
      {
        "category": "external",
        "summary": "1752929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752929"
      },
      {
        "category": "external",
        "summary": "1753059",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753059"
      },
      {
        "category": "external",
        "summary": "1753067",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753067"
      },
      {
        "category": "external",
        "summary": "1753124",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753124"
      },
      {
        "category": "external",
        "summary": "1753187",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753187"
      },
      {
        "category": "external",
        "summary": "1753216",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753216"
      },
      {
        "category": "external",
        "summary": "1753232",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753232"
      },
      {
        "category": "external",
        "summary": "1753265",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753265"
      },
      {
        "category": "external",
        "summary": "1753419",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753419"
      },
      {
        "category": "external",
        "summary": "1753467",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753467"
      },
      {
        "category": "external",
        "summary": "1753472",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753472"
      },
      {
        "category": "external",
        "summary": "1753568",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753568"
      },
      {
        "category": "external",
        "summary": "1753618",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753618"
      },
      {
        "category": "external",
        "summary": "1753688",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753688"
      },
      {
        "category": "external",
        "summary": "1753731",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753731"
      },
      {
        "category": "external",
        "summary": "1753734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753734"
      },
      {
        "category": "external",
        "summary": "1753778",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753778"
      },
      {
        "category": "external",
        "summary": "1753812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753812"
      },
      {
        "category": "external",
        "summary": "1753884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753884"
      },
      {
        "category": "external",
        "summary": "1753930",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753930"
      },
      {
        "category": "external",
        "summary": "1753936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753936"
      },
      {
        "category": "external",
        "summary": "1753953",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753953"
      },
      {
        "category": "external",
        "summary": "1754042",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754042"
      },
      {
        "category": "external",
        "summary": "1754049",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754049"
      },
      {
        "category": "external",
        "summary": "1754070",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754070"
      },
      {
        "category": "external",
        "summary": "1754154",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754154"
      },
      {
        "category": "external",
        "summary": "1754412",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754412"
      },
      {
        "category": "external",
        "summary": "1754452",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754452"
      },
      {
        "category": "external",
        "summary": "1754542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754542"
      },
      {
        "category": "external",
        "summary": "1754569",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754569"
      },
      {
        "category": "external",
        "summary": "1754592",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754592"
      },
      {
        "category": "external",
        "summary": "1754631",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754631"
      },
      {
        "category": "external",
        "summary": "1754640",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754640"
      },
      {
        "category": "external",
        "summary": "1754644",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754644"
      },
      {
        "category": "external",
        "summary": "1754647",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754647"
      },
      {
        "category": "external",
        "summary": "1754682",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754682"
      },
      {
        "category": "external",
        "summary": "1754738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754738"
      },
      {
        "category": "external",
        "summary": "1754789",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754789"
      },
      {
        "category": "external",
        "summary": "1754840",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754840"
      },
      {
        "category": "external",
        "summary": "1754939",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754939"
      },
      {
        "category": "external",
        "summary": "1755000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755000"
      },
      {
        "category": "external",
        "summary": "1755115",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755115"
      },
      {
        "category": "external",
        "summary": "1755130",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755130"
      },
      {
        "category": "external",
        "summary": "1755240",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755240"
      },
      {
        "category": "external",
        "summary": "1755383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755383"
      },
      {
        "category": "external",
        "summary": "1755469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755469"
      },
      {
        "category": "external",
        "summary": "1755552",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755552"
      },
      {
        "category": "external",
        "summary": "1755560",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755560"
      },
      {
        "category": "external",
        "summary": "1755606",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755606"
      },
      {
        "category": "external",
        "summary": "1755699",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755699"
      },
      {
        "category": "external",
        "summary": "1755784",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755784"
      },
      {
        "category": "external",
        "summary": "1755812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755812"
      },
      {
        "category": "external",
        "summary": "1755936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755936"
      },
      {
        "category": "external",
        "summary": "1755991",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755991"
      },
      {
        "category": "external",
        "summary": "1756107",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756107"
      },
      {
        "category": "external",
        "summary": "1756108",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756108"
      },
      {
        "category": "external",
        "summary": "1756132",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756132"
      },
      {
        "category": "external",
        "summary": "1756189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756189"
      },
      {
        "category": "external",
        "summary": "1756298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756298"
      },
      {
        "category": "external",
        "summary": "1756302",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756302"
      },
      {
        "category": "external",
        "summary": "1756312",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756312"
      },
      {
        "category": "external",
        "summary": "1756319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756319"
      },
      {
        "category": "external",
        "summary": "1756344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756344"
      },
      {
        "category": "external",
        "summary": "1756417",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756417"
      },
      {
        "category": "external",
        "summary": "1756421",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756421"
      },
      {
        "category": "external",
        "summary": "1756442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756442"
      },
      {
        "category": "external",
        "summary": "1756453",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756453"
      },
      {
        "category": "external",
        "summary": "1756461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756461"
      },
      {
        "category": "external",
        "summary": "1756471",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756471"
      },
      {
        "category": "external",
        "summary": "1756475",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756475"
      },
      {
        "category": "external",
        "summary": "1756500",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756500"
      },
      {
        "category": "external",
        "summary": "1756542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756542"
      },
      {
        "category": "external",
        "summary": "1756548",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756548"
      },
      {
        "category": "external",
        "summary": "1756669",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756669"
      },
      {
        "category": "external",
        "summary": "1756981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756981"
      },
      {
        "category": "external",
        "summary": "1757099",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757099"
      },
      {
        "category": "external",
        "summary": "1757110",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757110"
      },
      {
        "category": "external",
        "summary": "1757141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757141"
      },
      {
        "category": "external",
        "summary": "1757319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757319"
      },
      {
        "category": "external",
        "summary": "1757424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757424"
      },
      {
        "category": "external",
        "summary": "1757503",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757503"
      },
      {
        "category": "external",
        "summary": "1757526",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757526"
      },
      {
        "category": "external",
        "summary": "1757547",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757547"
      },
      {
        "category": "external",
        "summary": "1757752",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757752"
      },
      {
        "category": "external",
        "summary": "1757777",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757777"
      },
      {
        "category": "external",
        "summary": "1757836",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757836"
      },
      {
        "category": "external",
        "summary": "1757973",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757973"
      },
      {
        "category": "external",
        "summary": "1757975",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757975"
      },
      {
        "category": "external",
        "summary": "1758008",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758008"
      },
      {
        "category": "external",
        "summary": "1758031",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758031"
      },
      {
        "category": "external",
        "summary": "1758091",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758091"
      },
      {
        "category": "external",
        "summary": "1758306",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758306"
      },
      {
        "category": "external",
        "summary": "1758343",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758343"
      },
      {
        "category": "external",
        "summary": "1758434",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758434"
      },
      {
        "category": "external",
        "summary": "1758500",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758500"
      },
      {
        "category": "external",
        "summary": "1758528",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758528"
      },
      {
        "category": "external",
        "summary": "1758543",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758543"
      },
      {
        "category": "external",
        "summary": "1758606",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758606"
      },
      {
        "category": "external",
        "summary": "1758623",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758623"
      },
      {
        "category": "external",
        "summary": "1758628",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758628"
      },
      {
        "category": "external",
        "summary": "1758666",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758666"
      },
      {
        "category": "external",
        "summary": "1758687",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758687"
      },
      {
        "category": "external",
        "summary": "1759095",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759095"
      },
      {
        "category": "external",
        "summary": "1759169",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759169"
      },
      {
        "category": "external",
        "summary": "1759185",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759185"
      },
      {
        "category": "external",
        "summary": "1759248",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759248"
      },
      {
        "category": "external",
        "summary": "1759299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759299"
      },
      {
        "category": "external",
        "summary": "1759363",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759363"
      },
      {
        "category": "external",
        "summary": "1759469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759469"
      },
      {
        "category": "external",
        "summary": "1759487",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759487"
      },
      {
        "category": "external",
        "summary": "1759494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759494"
      },
      {
        "category": "external",
        "summary": "1759659",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759659"
      },
      {
        "category": "external",
        "summary": "1759880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759880"
      },
      {
        "category": "external",
        "summary": "1759920",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759920"
      },
      {
        "category": "external",
        "summary": "1759945",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759945"
      },
      {
        "category": "external",
        "summary": "1759965",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759965"
      },
      {
        "category": "external",
        "summary": "1759971",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759971"
      },
      {
        "category": "external",
        "summary": "1759984",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759984"
      },
      {
        "category": "external",
        "summary": "1759998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759998"
      },
      {
        "category": "external",
        "summary": "1760103",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760103"
      },
      {
        "category": "external",
        "summary": "1760393",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760393"
      },
      {
        "category": "external",
        "summary": "1760425",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760425"
      },
      {
        "category": "external",
        "summary": "1760478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760478"
      },
      {
        "category": "external",
        "summary": "1760479",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760479"
      },
      {
        "category": "external",
        "summary": "1760494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760494"
      },
      {
        "category": "external",
        "summary": "1760665",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760665"
      },
      {
        "category": "external",
        "summary": "1760787",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760787"
      },
      {
        "category": "external",
        "summary": "1760810",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760810"
      },
      {
        "category": "external",
        "summary": "1760827",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760827"
      },
      {
        "category": "external",
        "summary": "1760836",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760836"
      },
      {
        "category": "external",
        "summary": "1760858",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760858"
      },
      {
        "category": "external",
        "summary": "1761041",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761041"
      },
      {
        "category": "external",
        "summary": "1761049",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761049"
      },
      {
        "category": "external",
        "summary": "1761276",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761276"
      },
      {
        "category": "external",
        "summary": "1761344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761344"
      },
      {
        "category": "external",
        "summary": "1761348",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761348"
      },
      {
        "category": "external",
        "summary": "1761372",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761372"
      },
      {
        "category": "external",
        "summary": "1761505",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761505"
      },
      {
        "category": "external",
        "summary": "1761506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761506"
      },
      {
        "category": "external",
        "summary": "1761557",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761557"
      },
      {
        "category": "external",
        "summary": "1761682",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761682"
      },
      {
        "category": "external",
        "summary": "1761689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761689"
      },
      {
        "category": "external",
        "summary": "1761721",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761721"
      },
      {
        "category": "external",
        "summary": "1761815",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761815"
      },
      {
        "category": "external",
        "summary": "1761871",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761871"
      },
      {
        "category": "external",
        "summary": "1761921",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761921"
      },
      {
        "category": "external",
        "summary": "1761924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761924"
      },
      {
        "category": "external",
        "summary": "1761925",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761925"
      },
      {
        "category": "external",
        "summary": "1762137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762137"
      },
      {
        "category": "external",
        "summary": "1762145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762145"
      },
      {
        "category": "external",
        "summary": "1762149",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762149"
      },
      {
        "category": "external",
        "summary": "1762162",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762162"
      },
      {
        "category": "external",
        "summary": "1762217",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762217"
      },
      {
        "category": "external",
        "summary": "1762298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762298"
      },
      {
        "category": "external",
        "summary": "1762343",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762343"
      },
      {
        "category": "external",
        "summary": "1762413",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762413"
      },
      {
        "category": "external",
        "summary": "1762536",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762536"
      },
      {
        "category": "external",
        "summary": "1762614",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762614"
      },
      {
        "category": "external",
        "summary": "1762618",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762618"
      },
      {
        "category": "external",
        "summary": "1762653",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762653"
      },
      {
        "category": "external",
        "summary": "1762769",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762769"
      },
      {
        "category": "external",
        "summary": "1762787",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762787"
      },
      {
        "category": "external",
        "summary": "1762841",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762841"
      },
      {
        "category": "external",
        "summary": "1762868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762868"
      },
      {
        "category": "external",
        "summary": "1762888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762888"
      },
      {
        "category": "external",
        "summary": "1762968",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762968"
      },
      {
        "category": "external",
        "summary": "1762979",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762979"
      },
      {
        "category": "external",
        "summary": "1763005",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763005"
      },
      {
        "category": "external",
        "summary": "1763056",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763056"
      },
      {
        "category": "external",
        "summary": "1763078",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763078"
      },
      {
        "category": "external",
        "summary": "1763091",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763091"
      },
      {
        "category": "external",
        "summary": "1763278",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763278"
      },
      {
        "category": "external",
        "summary": "1763293",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763293"
      },
      {
        "category": "external",
        "summary": "1763303",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763303"
      },
      {
        "category": "external",
        "summary": "1763306",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763306"
      },
      {
        "category": "external",
        "summary": "1763341",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763341"
      },
      {
        "category": "external",
        "summary": "1763605",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763605"
      },
      {
        "category": "external",
        "summary": "1763635",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763635"
      },
      {
        "category": "external",
        "summary": "1763639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763639"
      },
      {
        "category": "external",
        "summary": "1763700",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763700"
      },
      {
        "category": "external",
        "summary": "1763725",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763725"
      },
      {
        "category": "external",
        "summary": "1763727",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763727"
      },
      {
        "category": "external",
        "summary": "1763728",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763728"
      },
      {
        "category": "external",
        "summary": "1763807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763807"
      },
      {
        "category": "external",
        "summary": "1763821",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763821"
      },
      {
        "category": "external",
        "summary": "1763836",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763836"
      },
      {
        "category": "external",
        "summary": "1763849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763849"
      },
      {
        "category": "external",
        "summary": "1763927",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763927"
      },
      {
        "category": "external",
        "summary": "1763929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763929"
      },
      {
        "category": "external",
        "summary": "1764017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764017"
      },
      {
        "category": "external",
        "summary": "1764076",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764076"
      },
      {
        "category": "external",
        "summary": "1764079",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764079"
      },
      {
        "category": "external",
        "summary": "1764081",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764081"
      },
      {
        "category": "external",
        "summary": "1764092",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764092"
      },
      {
        "category": "external",
        "summary": "1764216",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764216"
      },
      {
        "category": "external",
        "summary": "1764219",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764219"
      },
      {
        "category": "external",
        "summary": "1764224",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764224"
      },
      {
        "category": "external",
        "summary": "1764313",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764313"
      },
      {
        "category": "external",
        "summary": "1764323",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764323"
      },
      {
        "category": "external",
        "summary": "1764411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764411"
      },
      {
        "category": "external",
        "summary": "1764414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764414"
      },
      {
        "category": "external",
        "summary": "1764491",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764491"
      },
      {
        "category": "external",
        "summary": "1764498",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764498"
      },
      {
        "category": "external",
        "summary": "1764556",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764556"
      },
      {
        "category": "external",
        "summary": "1764558",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764558"
      },
      {
        "category": "external",
        "summary": "1764704",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764704"
      },
      {
        "category": "external",
        "summary": "1764728",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764728"
      },
      {
        "category": "external",
        "summary": "1765009",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765009"
      },
      {
        "category": "external",
        "summary": "1765015",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765015"
      },
      {
        "category": "external",
        "summary": "1765068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765068"
      },
      {
        "category": "external",
        "summary": "1765083",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765083"
      },
      {
        "category": "external",
        "summary": "1765177",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765177"
      },
      {
        "category": "external",
        "summary": "1765219",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765219"
      },
      {
        "category": "external",
        "summary": "1765261",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765261"
      },
      {
        "category": "external",
        "summary": "1765269",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765269"
      },
      {
        "category": "external",
        "summary": "1765282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765282"
      },
      {
        "category": "external",
        "summary": "1765315",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765315"
      },
      {
        "category": "external",
        "summary": "1765427",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765427"
      },
      {
        "category": "external",
        "summary": "1765457",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765457"
      },
      {
        "category": "external",
        "summary": "1765458",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765458"
      },
      {
        "category": "external",
        "summary": "1765733",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765733"
      },
      {
        "category": "external",
        "summary": "1765738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765738"
      },
      {
        "category": "external",
        "summary": "1765749",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765749"
      },
      {
        "category": "external",
        "summary": "1765756",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765756"
      },
      {
        "category": "external",
        "summary": "1765803",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765803"
      },
      {
        "category": "external",
        "summary": "1766111",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766111"
      },
      {
        "category": "external",
        "summary": "1766141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766141"
      },
      {
        "category": "external",
        "summary": "1766181",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766181"
      },
      {
        "category": "external",
        "summary": "1766187",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766187"
      },
      {
        "category": "external",
        "summary": "1766339",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766339"
      },
      {
        "category": "external",
        "summary": "1766356",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766356"
      },
      {
        "category": "external",
        "summary": "1766446",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766446"
      },
      {
        "category": "external",
        "summary": "1766482",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766482"
      },
      {
        "category": "external",
        "summary": "1766513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766513"
      },
      {
        "category": "external",
        "summary": "1766587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766587"
      },
      {
        "category": "external",
        "summary": "1766607",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766607"
      },
      {
        "category": "external",
        "summary": "1766632",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766632"
      },
      {
        "category": "external",
        "summary": "1766638",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766638"
      },
      {
        "category": "external",
        "summary": "1766739",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766739"
      },
      {
        "category": "external",
        "summary": "1766747",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766747"
      },
      {
        "category": "external",
        "summary": "1766792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766792"
      },
      {
        "category": "external",
        "summary": "1766851",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766851"
      },
      {
        "category": "external",
        "summary": "1766856",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766856"
      },
      {
        "category": "external",
        "summary": "1766907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766907"
      },
      {
        "category": "external",
        "summary": "1766918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766918"
      },
      {
        "category": "external",
        "summary": "1766949",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766949"
      },
      {
        "category": "external",
        "summary": "1766984",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766984"
      },
      {
        "category": "external",
        "summary": "1767004",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767004"
      },
      {
        "category": "external",
        "summary": "1767014",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767014"
      },
      {
        "category": "external",
        "summary": "1767156",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767156"
      },
      {
        "category": "external",
        "summary": "1767163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767163"
      },
      {
        "category": "external",
        "summary": "1767218",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767218"
      },
      {
        "category": "external",
        "summary": "1767219",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767219"
      },
      {
        "category": "external",
        "summary": "1767295",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767295"
      },
      {
        "category": "external",
        "summary": "1767547",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767547"
      },
      {
        "category": "external",
        "summary": "1767629",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767629"
      },
      {
        "category": "external",
        "summary": "1767675",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767675"
      },
      {
        "category": "external",
        "summary": "1767853",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767853"
      },
      {
        "category": "external",
        "summary": "1767926",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767926"
      },
      {
        "category": "external",
        "summary": "1767954",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767954"
      },
      {
        "category": "external",
        "summary": "1767964",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767964"
      },
      {
        "category": "external",
        "summary": "1768002",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768002"
      },
      {
        "category": "external",
        "summary": "1768262",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768262"
      },
      {
        "category": "external",
        "summary": "1768298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768298"
      },
      {
        "category": "external",
        "summary": "1768315",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768315"
      },
      {
        "category": "external",
        "summary": "1768328",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768328"
      },
      {
        "category": "external",
        "summary": "1768333",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768333"
      },
      {
        "category": "external",
        "summary": "1768341",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768341"
      },
      {
        "category": "external",
        "summary": "1768346",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768346"
      },
      {
        "category": "external",
        "summary": "1768350",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768350"
      },
      {
        "category": "external",
        "summary": "1768357",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768357"
      },
      {
        "category": "external",
        "summary": "1768359",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768359"
      },
      {
        "category": "external",
        "summary": "1768417",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768417"
      },
      {
        "category": "external",
        "summary": "1768442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768442"
      },
      {
        "category": "external",
        "summary": "1768474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768474"
      },
      {
        "category": "external",
        "summary": "1768483",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768483"
      },
      {
        "category": "external",
        "summary": "1768492",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768492"
      },
      {
        "category": "external",
        "summary": "1768507",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768507"
      },
      {
        "category": "external",
        "summary": "1768516",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768516"
      },
      {
        "category": "external",
        "summary": "1768537",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768537"
      },
      {
        "category": "external",
        "summary": "1768542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768542"
      },
      {
        "category": "external",
        "summary": "1768936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768936"
      },
      {
        "category": "external",
        "summary": "1768564",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768564"
      },
      {
        "category": "external",
        "summary": "1768568",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768568"
      },
      {
        "category": "external",
        "summary": "1768599",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768599"
      },
      {
        "category": "external",
        "summary": "1768611",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768611"
      },
      {
        "category": "external",
        "summary": "1768614",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768614"
      },
      {
        "category": "external",
        "summary": "1768616",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768616"
      },
      {
        "category": "external",
        "summary": "1768639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768639"
      },
      {
        "category": "external",
        "summary": "1768654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768654"
      },
      {
        "category": "external",
        "summary": "1768662",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768662"
      },
      {
        "category": "external",
        "summary": "1768684",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768684"
      },
      {
        "category": "external",
        "summary": "1768685",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768685"
      },
      {
        "category": "external",
        "summary": "1768688",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768688"
      },
      {
        "category": "external",
        "summary": "1768701",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768701"
      },
      {
        "category": "external",
        "summary": "1768716",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768716"
      },
      {
        "category": "external",
        "summary": "1768723",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768723"
      },
      {
        "category": "external",
        "summary": "1768765",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768765"
      },
      {
        "category": "external",
        "summary": "1768769",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768769"
      },
      {
        "category": "external",
        "summary": "1768771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768771"
      },
      {
        "category": "external",
        "summary": "1768782",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768782"
      },
      {
        "category": "external",
        "summary": "1768814",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768814"
      },
      {
        "category": "external",
        "summary": "1768820",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768820"
      },
      {
        "category": "external",
        "summary": "1768877",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768877"
      },
      {
        "category": "external",
        "summary": "1768905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768905"
      },
      {
        "category": "external",
        "summary": "1768926",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768926"
      },
      {
        "category": "external",
        "summary": "1768938",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768938"
      },
      {
        "category": "external",
        "summary": "1769005",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769005"
      },
      {
        "category": "external",
        "summary": "1769011",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769011"
      },
      {
        "category": "external",
        "summary": "1769012",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769012"
      },
      {
        "category": "external",
        "summary": "1769013",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769013"
      },
      {
        "category": "external",
        "summary": "1769016",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769016"
      },
      {
        "category": "external",
        "summary": "1769017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769017"
      },
      {
        "category": "external",
        "summary": "1769076",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769076"
      },
      {
        "category": "external",
        "summary": "1769151",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769151"
      },
      {
        "category": "external",
        "summary": "1769157",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769157"
      },
      {
        "category": "external",
        "summary": "1769167",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769167"
      },
      {
        "category": "external",
        "summary": "1769174",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769174"
      },
      {
        "category": "external",
        "summary": "1769263",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769263"
      },
      {
        "category": "external",
        "summary": "1769303",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769303"
      },
      {
        "category": "external",
        "summary": "1769325",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769325"
      },
      {
        "category": "external",
        "summary": "1769331",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769331"
      },
      {
        "category": "external",
        "summary": "1769391",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769391"
      },
      {
        "category": "external",
        "summary": "1769395",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769395"
      },
      {
        "category": "external",
        "summary": "1769412",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769412"
      },
      {
        "category": "external",
        "summary": "1769422",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769422"
      },
      {
        "category": "external",
        "summary": "1769435",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769435"
      },
      {
        "category": "external",
        "summary": "1769455",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769455"
      },
      {
        "category": "external",
        "summary": "1769468",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769468"
      },
      {
        "category": "external",
        "summary": "1769578",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769578"
      },
      {
        "category": "external",
        "summary": "1769585",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769585"
      },
      {
        "category": "external",
        "summary": "1769601",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769601"
      },
      {
        "category": "external",
        "summary": "1769602",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769602"
      },
      {
        "category": "external",
        "summary": "1769609",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769609"
      },
      {
        "category": "external",
        "summary": "1769612",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769612"
      },
      {
        "category": "external",
        "summary": "1769615",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769615"
      },
      {
        "category": "external",
        "summary": "1769641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769641"
      },
      {
        "category": "external",
        "summary": "1769645",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769645"
      },
      {
        "category": "external",
        "summary": "1769647",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769647"
      },
      {
        "category": "external",
        "summary": "1769700",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769700"
      },
      {
        "category": "external",
        "summary": "1769704",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769704"
      },
      {
        "category": "external",
        "summary": "1769742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769742"
      },
      {
        "category": "external",
        "summary": "1769768",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769768"
      },
      {
        "category": "external",
        "summary": "1769779",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769779"
      },
      {
        "category": "external",
        "summary": "1769793",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769793"
      },
      {
        "category": "external",
        "summary": "1769807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769807"
      },
      {
        "category": "external",
        "summary": "1769915",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769915"
      },
      {
        "category": "external",
        "summary": "1769949",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769949"
      },
      {
        "category": "external",
        "summary": "1769962",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769962"
      },
      {
        "category": "external",
        "summary": "1769985",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769985"
      },
      {
        "category": "external",
        "summary": "1770003",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770003"
      },
      {
        "category": "external",
        "summary": "1770006",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770006"
      },
      {
        "category": "external",
        "summary": "1770084",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770084"
      },
      {
        "category": "external",
        "summary": "1770101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770101"
      },
      {
        "category": "external",
        "summary": "1770108",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770108"
      },
      {
        "category": "external",
        "summary": "1770109",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770109"
      },
      {
        "category": "external",
        "summary": "1770144",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770144"
      },
      {
        "category": "external",
        "summary": "1770152",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770152"
      },
      {
        "category": "external",
        "summary": "1770269",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770269"
      },
      {
        "category": "external",
        "summary": "1770273",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770273"
      },
      {
        "category": "external",
        "summary": "1770348",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770348"
      },
      {
        "category": "external",
        "summary": "1770387",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770387"
      },
      {
        "category": "external",
        "summary": "1770406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770406"
      },
      {
        "category": "external",
        "summary": "1770441",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770441"
      },
      {
        "category": "external",
        "summary": "1770573",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770573"
      },
      {
        "category": "external",
        "summary": "1770642",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770642"
      },
      {
        "category": "external",
        "summary": "1770654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770654"
      },
      {
        "category": "external",
        "summary": "1770655",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770655"
      },
      {
        "category": "external",
        "summary": "1770665",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770665"
      },
      {
        "category": "external",
        "summary": "1770709",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770709"
      },
      {
        "category": "external",
        "summary": "1770724",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770724"
      },
      {
        "category": "external",
        "summary": "1770749",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770749"
      },
      {
        "category": "external",
        "summary": "1770757",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770757"
      },
      {
        "category": "external",
        "summary": "1770808",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770808"
      },
      {
        "category": "external",
        "summary": "1770903",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770903"
      },
      {
        "category": "external",
        "summary": "1770970",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770970"
      },
      {
        "category": "external",
        "summary": "1771003",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771003"
      },
      {
        "category": "external",
        "summary": "1771017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771017"
      },
      {
        "category": "external",
        "summary": "1771172",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771172"
      },
      {
        "category": "external",
        "summary": "1771233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771233"
      },
      {
        "category": "external",
        "summary": "1771245",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771245"
      },
      {
        "category": "external",
        "summary": "1771249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771249"
      },
      {
        "category": "external",
        "summary": "1771273",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771273"
      },
      {
        "category": "external",
        "summary": "1771321",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771321"
      },
      {
        "category": "external",
        "summary": "1771335",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771335"
      },
      {
        "category": "external",
        "summary": "1771355",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771355"
      },
      {
        "category": "external",
        "summary": "1771389",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771389"
      },
      {
        "category": "external",
        "summary": "1771431",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771431"
      },
      {
        "category": "external",
        "summary": "1771522",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771522"
      },
      {
        "category": "external",
        "summary": "1771736",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771736"
      },
      {
        "category": "external",
        "summary": "1771744",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771744"
      },
      {
        "category": "external",
        "summary": "1771783",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771783"
      },
      {
        "category": "external",
        "summary": "1771784",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771784"
      },
      {
        "category": "external",
        "summary": "1771813",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771813"
      },
      {
        "category": "external",
        "summary": "1771843",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771843"
      },
      {
        "category": "external",
        "summary": "1771850",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771850"
      },
      {
        "category": "external",
        "summary": "1771851",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771851"
      },
      {
        "category": "external",
        "summary": "1771919",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771919"
      },
      {
        "category": "external",
        "summary": "1771931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771931"
      },
      {
        "category": "external",
        "summary": "1771995",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771995"
      },
      {
        "category": "external",
        "summary": "1772000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772000"
      },
      {
        "category": "external",
        "summary": "1772340",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772340"
      },
      {
        "category": "external",
        "summary": "1772002",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772002"
      },
      {
        "category": "external",
        "summary": "1772049",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772049"
      },
      {
        "category": "external",
        "summary": "1772067",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772067"
      },
      {
        "category": "external",
        "summary": "1772080",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772080"
      },
      {
        "category": "external",
        "summary": "1772094",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772094"
      },
      {
        "category": "external",
        "summary": "1772154",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772154"
      },
      {
        "category": "external",
        "summary": "1772155",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772155"
      },
      {
        "category": "external",
        "summary": "1772163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772163"
      },
      {
        "category": "external",
        "summary": "1772190",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772190"
      },
      {
        "category": "external",
        "summary": "1772317",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772317"
      },
      {
        "category": "external",
        "summary": "1772346",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772346"
      },
      {
        "category": "external",
        "summary": "1772392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772392"
      },
      {
        "category": "external",
        "summary": "1772451",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772451"
      },
      {
        "category": "external",
        "summary": "1772455",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772455"
      },
      {
        "category": "external",
        "summary": "1772477",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772477"
      },
      {
        "category": "external",
        "summary": "1772502",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772502"
      },
      {
        "category": "external",
        "summary": "1772509",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772509"
      },
      {
        "category": "external",
        "summary": "1772599",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772599"
      },
      {
        "category": "external",
        "summary": "1772687",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772687"
      },
      {
        "category": "external",
        "summary": "1772767",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772767"
      },
      {
        "category": "external",
        "summary": "1772796",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772796"
      },
      {
        "category": "external",
        "summary": "1772804",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772804"
      },
      {
        "category": "external",
        "summary": "1772849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772849"
      },
      {
        "category": "external",
        "summary": "1772874",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772874"
      },
      {
        "category": "external",
        "summary": "1772900",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772900"
      },
      {
        "category": "external",
        "summary": "1772912",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772912"
      },
      {
        "category": "external",
        "summary": "1773243",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773243"
      },
      {
        "category": "external",
        "summary": "1773431",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773431"
      },
      {
        "category": "external",
        "summary": "1773480",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773480"
      },
      {
        "category": "external",
        "summary": "1773634",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773634"
      },
      {
        "category": "external",
        "summary": "1773661",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773661"
      },
      {
        "category": "external",
        "summary": "1773686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773686"
      },
      {
        "category": "external",
        "summary": "1773725",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773725"
      },
      {
        "category": "external",
        "summary": "1773727",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773727"
      },
      {
        "category": "external",
        "summary": "1773733",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773733"
      },
      {
        "category": "external",
        "summary": "1773847",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773847"
      },
      {
        "category": "external",
        "summary": "1773854",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773854"
      },
      {
        "category": "external",
        "summary": "1773995",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773995"
      },
      {
        "category": "external",
        "summary": "1774060",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774060"
      },
      {
        "category": "external",
        "summary": "1774173",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774173"
      },
      {
        "category": "external",
        "summary": "1774212",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774212"
      },
      {
        "category": "external",
        "summary": "1774352",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774352"
      },
      {
        "category": "external",
        "summary": "1774353",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774353"
      },
      {
        "category": "external",
        "summary": "1774369",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774369"
      },
      {
        "category": "external",
        "summary": "1774451",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774451"
      },
      {
        "category": "external",
        "summary": "1774589",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774589"
      },
      {
        "category": "external",
        "summary": "1774630",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774630"
      },
      {
        "category": "external",
        "summary": "1774642",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774642"
      },
      {
        "category": "external",
        "summary": "1774720",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774720"
      },
      {
        "category": "external",
        "summary": "1774813",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774813"
      },
      {
        "category": "external",
        "summary": "1774837",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774837"
      },
      {
        "category": "external",
        "summary": "1774841",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774841"
      },
      {
        "category": "external",
        "summary": "1774907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774907"
      },
      {
        "category": "external",
        "summary": "1774912",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774912"
      },
      {
        "category": "external",
        "summary": "1774917",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774917"
      },
      {
        "category": "external",
        "summary": "1774930",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774930"
      },
      {
        "category": "external",
        "summary": "1774936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774936"
      },
      {
        "category": "external",
        "summary": "1775009",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775009"
      },
      {
        "category": "external",
        "summary": "1775055",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775055"
      },
      {
        "category": "external",
        "summary": "1775119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775119"
      },
      {
        "category": "external",
        "summary": "1775131",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775131"
      },
      {
        "category": "external",
        "summary": "1775156",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775156"
      },
      {
        "category": "external",
        "summary": "1775170",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775170"
      },
      {
        "category": "external",
        "summary": "1775245",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775245"
      },
      {
        "category": "external",
        "summary": "1775279",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775279"
      },
      {
        "category": "external",
        "summary": "1775323",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775323"
      },
      {
        "category": "external",
        "summary": "1775379",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775379"
      },
      {
        "category": "external",
        "summary": "1775384",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775384"
      },
      {
        "category": "external",
        "summary": "1775527",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775527"
      },
      {
        "category": "external",
        "summary": "1775580",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775580"
      },
      {
        "category": "external",
        "summary": "1775643",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775643"
      },
      {
        "category": "external",
        "summary": "1775723",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775723"
      },
      {
        "category": "external",
        "summary": "1775730",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775730"
      },
      {
        "category": "external",
        "summary": "1775742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775742"
      },
      {
        "category": "external",
        "summary": "1775752",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775752"
      },
      {
        "category": "external",
        "summary": "1775826",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775826"
      },
      {
        "category": "external",
        "summary": "1775849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775849"
      },
      {
        "category": "external",
        "summary": "1775874",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775874"
      },
      {
        "category": "external",
        "summary": "1775878",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775878"
      },
      {
        "category": "external",
        "summary": "1776010",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776010"
      },
      {
        "category": "external",
        "summary": "1776043",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776043"
      },
      {
        "category": "external",
        "summary": "1776060",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776060"
      },
      {
        "category": "external",
        "summary": "1776135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776135"
      },
      {
        "category": "external",
        "summary": "1776189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776189"
      },
      {
        "category": "external",
        "summary": "1776193",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776193"
      },
      {
        "category": "external",
        "summary": "1776213",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776213"
      },
      {
        "category": "external",
        "summary": "1776295",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776295"
      },
      {
        "category": "external",
        "summary": "1776297",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776297"
      },
      {
        "category": "external",
        "summary": "1776305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776305"
      },
      {
        "category": "external",
        "summary": "1776311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776311"
      },
      {
        "category": "external",
        "summary": "1776339",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776339"
      },
      {
        "category": "external",
        "summary": "1776401",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776401"
      },
      {
        "category": "external",
        "summary": "1776421",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776421"
      },
      {
        "category": "external",
        "summary": "1776474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776474"
      },
      {
        "category": "external",
        "summary": "1776486",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776486"
      },
      {
        "category": "external",
        "summary": "1776493",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776493"
      },
      {
        "category": "external",
        "summary": "1776521",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776521"
      },
      {
        "category": "external",
        "summary": "1776533",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776533"
      },
      {
        "category": "external",
        "summary": "1776604",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776604"
      },
      {
        "category": "external",
        "summary": "1776660",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776660"
      },
      {
        "category": "external",
        "summary": "1776698",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776698"
      },
      {
        "category": "external",
        "summary": "1776700",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776700"
      },
      {
        "category": "external",
        "summary": "1776708",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776708"
      },
      {
        "category": "external",
        "summary": "1776759",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776759"
      },
      {
        "category": "external",
        "summary": "1776768",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776768"
      },
      {
        "category": "external",
        "summary": "1776773",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776773"
      },
      {
        "category": "external",
        "summary": "1776797",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776797"
      },
      {
        "category": "external",
        "summary": "1776812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776812"
      },
      {
        "category": "external",
        "summary": "1776867",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776867"
      },
      {
        "category": "external",
        "summary": "1776885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776885"
      },
      {
        "category": "external",
        "summary": "1776897",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776897"
      },
      {
        "category": "external",
        "summary": "1776914",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776914"
      },
      {
        "category": "external",
        "summary": "1776935",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776935"
      },
      {
        "category": "external",
        "summary": "1776990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776990"
      },
      {
        "category": "external",
        "summary": "1777036",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777036"
      },
      {
        "category": "external",
        "summary": "1777178",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777178"
      },
      {
        "category": "external",
        "summary": "1777205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777205"
      },
      {
        "category": "external",
        "summary": "1777229",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777229"
      },
      {
        "category": "external",
        "summary": "1777233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777233"
      },
      {
        "category": "external",
        "summary": "1777273",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777273"
      },
      {
        "category": "external",
        "summary": "1777281",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777281"
      },
      {
        "category": "external",
        "summary": "1777291",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777291"
      },
      {
        "category": "external",
        "summary": "1777388",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777388"
      },
      {
        "category": "external",
        "summary": "1777424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777424"
      },
      {
        "category": "external",
        "summary": "1777477",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777477"
      },
      {
        "category": "external",
        "summary": "1777513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777513"
      },
      {
        "category": "external",
        "summary": "1777517",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777517"
      },
      {
        "category": "external",
        "summary": "1777593",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777593"
      },
      {
        "category": "external",
        "summary": "1777732",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777732"
      },
      {
        "category": "external",
        "summary": "1777753",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777753"
      },
      {
        "category": "external",
        "summary": "1777776",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777776"
      },
      {
        "category": "external",
        "summary": "1777838",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777838"
      },
      {
        "category": "external",
        "summary": "1777970",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777970"
      },
      {
        "category": "external",
        "summary": "1778017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778017"
      },
      {
        "category": "external",
        "summary": "1778205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778205"
      },
      {
        "category": "external",
        "summary": "1778213",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778213"
      },
      {
        "category": "external",
        "summary": "1778312",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778312"
      },
      {
        "category": "external",
        "summary": "1778535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778535"
      },
      {
        "category": "external",
        "summary": "1778686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778686"
      },
      {
        "category": "external",
        "summary": "1778894",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778894"
      },
      {
        "category": "external",
        "summary": "1778904",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778904"
      },
      {
        "category": "external",
        "summary": "1778930",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778930"
      },
      {
        "category": "external",
        "summary": "1778940",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778940"
      },
      {
        "category": "external",
        "summary": "1778954",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778954"
      },
      {
        "category": "external",
        "summary": "1779101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779101"
      },
      {
        "category": "external",
        "summary": "1779189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779189"
      },
      {
        "category": "external",
        "summary": "1779191",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779191"
      },
      {
        "category": "external",
        "summary": "1779195",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779195"
      },
      {
        "category": "external",
        "summary": "1779222",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779222"
      },
      {
        "category": "external",
        "summary": "1779237",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779237"
      },
      {
        "category": "external",
        "summary": "1779316",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779316"
      },
      {
        "category": "external",
        "summary": "1779322",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779322"
      },
      {
        "category": "external",
        "summary": "1779329",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779329"
      },
      {
        "category": "external",
        "summary": "1779332",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779332"
      },
      {
        "category": "external",
        "summary": "1779348",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779348"
      },
      {
        "category": "external",
        "summary": "1779383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779383"
      },
      {
        "category": "external",
        "summary": "1779487",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779487"
      },
      {
        "category": "external",
        "summary": "1779491",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779491"
      },
      {
        "category": "external",
        "summary": "1779492",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779492"
      },
      {
        "category": "external",
        "summary": "1779524",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779524"
      },
      {
        "category": "external",
        "summary": "1779535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779535"
      },
      {
        "category": "external",
        "summary": "1779665",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779665"
      },
      {
        "category": "external",
        "summary": "1779679",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779679"
      },
      {
        "category": "external",
        "summary": "1779681",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779681"
      },
      {
        "category": "external",
        "summary": "1779741",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779741"
      },
      {
        "category": "external",
        "summary": "1780587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780587"
      },
      {
        "category": "external",
        "summary": "1779791",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779791"
      },
      {
        "category": "external",
        "summary": "1779831",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779831"
      },
      {
        "category": "external",
        "summary": "1779913",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779913"
      },
      {
        "category": "external",
        "summary": "1779915",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779915"
      },
      {
        "category": "external",
        "summary": "1779916",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779916"
      },
      {
        "category": "external",
        "summary": "1779956",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779956"
      },
      {
        "category": "external",
        "summary": "1779995",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779995"
      },
      {
        "category": "external",
        "summary": "1780142",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780142"
      },
      {
        "category": "external",
        "summary": "1780379",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780379"
      },
      {
        "category": "external",
        "summary": "1780384",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780384"
      },
      {
        "category": "external",
        "summary": "1780408",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780408"
      },
      {
        "category": "external",
        "summary": "1780509",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780509"
      },
      {
        "category": "external",
        "summary": "1780590",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780590"
      },
      {
        "category": "external",
        "summary": "1780736",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780736"
      },
      {
        "category": "external",
        "summary": "1780738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780738"
      },
      {
        "category": "external",
        "summary": "1780835",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780835"
      },
      {
        "category": "external",
        "summary": "1780843",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780843"
      },
      {
        "category": "external",
        "summary": "1780953",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780953"
      },
      {
        "category": "external",
        "summary": "1780982",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780982"
      },
      {
        "category": "external",
        "summary": "1780989",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780989"
      },
      {
        "category": "external",
        "summary": "1780994",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780994"
      },
      {
        "category": "external",
        "summary": "1781019",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781019"
      },
      {
        "category": "external",
        "summary": "1781037",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781037"
      },
      {
        "category": "external",
        "summary": "1781053",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781053"
      },
      {
        "category": "external",
        "summary": "1781083",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781083"
      },
      {
        "category": "external",
        "summary": "1781104",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781104"
      },
      {
        "category": "external",
        "summary": "1781105",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781105"
      },
      {
        "category": "external",
        "summary": "1781141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781141"
      },
      {
        "category": "external",
        "summary": "1781178",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781178"
      },
      {
        "category": "external",
        "summary": "1781193",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781193"
      },
      {
        "category": "external",
        "summary": "1781258",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781258"
      },
      {
        "category": "external",
        "summary": "1781284",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781284"
      },
      {
        "category": "external",
        "summary": "1781286",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781286"
      },
      {
        "category": "external",
        "summary": "1781290",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781290"
      },
      {
        "category": "external",
        "summary": "1781313",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781313"
      },
      {
        "category": "external",
        "summary": "1781330",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781330"
      },
      {
        "category": "external",
        "summary": "1781347",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781347"
      },
      {
        "category": "external",
        "summary": "1781558",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781558"
      },
      {
        "category": "external",
        "summary": "1781577",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781577"
      },
      {
        "category": "external",
        "summary": "1781678",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781678"
      },
      {
        "category": "external",
        "summary": "1781763",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781763"
      },
      {
        "category": "external",
        "summary": "1781795",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781795"
      },
      {
        "category": "external",
        "summary": "1781798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781798"
      },
      {
        "category": "external",
        "summary": "1781843",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781843"
      },
      {
        "category": "external",
        "summary": "1781869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781869"
      },
      {
        "category": "external",
        "summary": "1781950",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781950"
      },
      {
        "category": "external",
        "summary": "1782104",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782104"
      },
      {
        "category": "external",
        "summary": "1782119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782119"
      },
      {
        "category": "external",
        "summary": "1782124",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782124"
      },
      {
        "category": "external",
        "summary": "1782147",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782147"
      },
      {
        "category": "external",
        "summary": "1782149",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782149"
      },
      {
        "category": "external",
        "summary": "1782164",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782164"
      },
      {
        "category": "external",
        "summary": "1782176",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782176"
      },
      {
        "category": "external",
        "summary": "1782204",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782204"
      },
      {
        "category": "external",
        "summary": "1782224",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782224"
      },
      {
        "category": "external",
        "summary": "1782237",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782237"
      },
      {
        "category": "external",
        "summary": "1782312",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782312"
      },
      {
        "category": "external",
        "summary": "1782409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782409"
      },
      {
        "category": "external",
        "summary": "1782447",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782447"
      },
      {
        "category": "external",
        "summary": "1782546",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782546"
      },
      {
        "category": "external",
        "summary": "1782584",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782584"
      },
      {
        "category": "external",
        "summary": "1782728",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782728"
      },
      {
        "category": "external",
        "summary": "1782795",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782795"
      },
      {
        "category": "external",
        "summary": "1782817",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782817"
      },
      {
        "category": "external",
        "summary": "1782819",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782819"
      },
      {
        "category": "external",
        "summary": "1782829",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782829"
      },
      {
        "category": "external",
        "summary": "1782837",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782837"
      },
      {
        "category": "external",
        "summary": "1782860",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782860"
      },
      {
        "category": "external",
        "summary": "1782992",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782992"
      },
      {
        "category": "external",
        "summary": "1782997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782997"
      },
      {
        "category": "external",
        "summary": "1783009",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783009"
      },
      {
        "category": "external",
        "summary": "1783010",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783010"
      },
      {
        "category": "external",
        "summary": "1783011",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783011"
      },
      {
        "category": "external",
        "summary": "1783259",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783259"
      },
      {
        "category": "external",
        "summary": "1783353",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783353"
      },
      {
        "category": "external",
        "summary": "1783448",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783448"
      },
      {
        "category": "external",
        "summary": "1783587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783587"
      },
      {
        "category": "external",
        "summary": "1783732",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783732"
      },
      {
        "category": "external",
        "summary": "1783829",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783829"
      },
      {
        "category": "external",
        "summary": "1783846",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783846"
      },
      {
        "category": "external",
        "summary": "1783892",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783892"
      },
      {
        "category": "external",
        "summary": "1783974",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783974"
      },
      {
        "category": "external",
        "summary": "1784082",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784082"
      },
      {
        "category": "external",
        "summary": "1784086",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784086"
      },
      {
        "category": "external",
        "summary": "1784166",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784166"
      },
      {
        "category": "external",
        "summary": "1784319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784319"
      },
      {
        "category": "external",
        "summary": "1784440",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784440"
      },
      {
        "category": "external",
        "summary": "1784469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784469"
      },
      {
        "category": "external",
        "summary": "1784475",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784475"
      },
      {
        "category": "external",
        "summary": "1784500",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784500"
      },
      {
        "category": "external",
        "summary": "1784629",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784629"
      },
      {
        "category": "external",
        "summary": "1784880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784880"
      },
      {
        "category": "external",
        "summary": "1784915",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784915"
      },
      {
        "category": "external",
        "summary": "1784981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784981"
      },
      {
        "category": "external",
        "summary": "1785138",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785138"
      },
      {
        "category": "external",
        "summary": "1785310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785310"
      },
      {
        "category": "external",
        "summary": "1785419",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785419"
      },
      {
        "category": "external",
        "summary": "1785675",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785675"
      },
      {
        "category": "external",
        "summary": "1786141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786141"
      },
      {
        "category": "external",
        "summary": "1786300",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786300"
      },
      {
        "category": "external",
        "summary": "1786993",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786993"
      },
      {
        "category": "external",
        "summary": "1787334",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787334"
      },
      {
        "category": "external",
        "summary": "1787587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787587"
      },
      {
        "category": "external",
        "summary": "1788054",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788054"
      },
      {
        "category": "external",
        "summary": "1788118",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788118"
      },
      {
        "category": "external",
        "summary": "1788321",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788321"
      },
      {
        "category": "external",
        "summary": "1788442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788442"
      },
      {
        "category": "external",
        "summary": "1788580",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788580"
      },
      {
        "category": "external",
        "summary": "1788621",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788621"
      },
      {
        "category": "external",
        "summary": "1788704",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788704"
      },
      {
        "category": "external",
        "summary": "1789001",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789001"
      },
      {
        "category": "external",
        "summary": "1789014",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789014"
      },
      {
        "category": "external",
        "summary": "1789601",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789601"
      },
      {
        "category": "external",
        "summary": "1790329",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790329"
      },
      {
        "category": "external",
        "summary": "1791332",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791332"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_0062.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3 image release advisory",
    "tracking": {
      "current_release_date": "2025-10-15T11:13:17+00:00",
      "generator": {
        "date": "2025-10-15T11:13:17+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHBA-2020:0062",
      "initial_release_date": "2020-01-23T11:03:26+00:00",
      "revision_history": [
        {
          "date": "2020-01-23T11:03:26+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-01-23T11:03:26+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-15T11:13:17+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.3",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.3",
                  "product_id": "7Server-RH7-RHOSE-4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.3::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.3",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.3",
                  "product_id": "8Base-RHOSE-4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.3::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
                  "product_id": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
                  "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
                  "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
                  "product_id": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
                  "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
                  "product_id": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
                "product": {
                  "name": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
                  "product_id": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
                "product": {
                  "name": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
                  "product_id": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
                "product": {
                  "name": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
                  "product_id": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
                  "product_id": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
                  "product_id": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
                  "product_id": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
                "product": {
                  "name": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
                  "product_id": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
                  "product_id": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
                  "product_id": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-hardware-inventory-recorder-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
                  "product_id": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-inspector-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
                  "product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
                  "product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-machine-os-downloader-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
                  "product_id": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-static-ip-manager-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
                  "product_id": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
                "product": {
                  "name": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
                  "product_id": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
                "product": {
                  "name": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
                  "product_id": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
                "product": {
                  "name": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
                  "product_id": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
                "product": {
                  "name": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
                  "product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64",
                "product": {
                  "name": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64",
                  "product_id": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-controller-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
                "product": {
                  "name": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
                  "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
                "product": {
                  "name": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
                  "product_id": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
                "product": {
                  "name": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
                  "product_id": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
                "product": {
                  "name": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
                  "product_id": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
                "product": {
                  "name": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
                  "product_id": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
                "product": {
                  "name": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
                  "product_id": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
                "product": {
                  "name": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
                  "product_id": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
                "product": {
                  "name": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
                  "product_id": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
                "product": {
                  "name": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
                  "product_id": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
                "product": {
                  "name": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
                  "product_id": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
                "product": {
                  "name": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
                  "product_id": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
                "product": {
                  "name": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
                  "product_id": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
                "product": {
                  "name": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
                  "product_id": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
                "product": {
                  "name": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
                  "product_id": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
                  "product_id": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
                "product": {
                  "name": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
                  "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
                "product": {
                  "name": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
                  "product_id": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
                "product": {
                  "name": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
                  "product_id": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
                "product": {
                  "name": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
                  "product_id": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
                "product": {
                  "name": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
                  "product_id": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
                "product": {
                  "name": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
                  "product_id": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
                  "product_id": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
                  "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
                  "product_id": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
                  "product_id": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
                  "product_id": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
                  "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
                  "product_id": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
                  "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
                  "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
                  "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
                  "product_id": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
                  "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
                  "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
                  "product_id": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
                  "product_id": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
                  "product_id": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
                "product": {
                  "name": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
                  "product_id": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
                "product": {
                  "name": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
                  "product_id": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
                "product": {
                  "name": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
                  "product_id": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
                "product": {
                  "name": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
                  "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
                "product": {
                  "name": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
                  "product_id": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
                "product": {
                  "name": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
                  "product_id": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
                "product": {
                  "name": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
                  "product_id": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
                "product": {
                  "name": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
                  "product_id": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
                  "product_id": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel7\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
                  "product_id": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel7\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
                "product": {
                  "name": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
                  "product_id": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
                "product": {
                  "name": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
                  "product_id": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
                "product": {
                  "name": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
                  "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
                "product": {
                  "name": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
                  "product_id": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
                  "product_id": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
                  "product_id": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
                "product": {
                  "name": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
                  "product_id": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
                "product": {
                  "name": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
                  "product_id": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.3.0-202001211731"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64"
        },
        "product_reference": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64"
        },
        "product_reference": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64"
        },
        "product_reference": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64"
        },
        "product_reference": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64"
        },
        "product_reference": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64"
        },
        "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64"
        },
        "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64"
        },
        "product_reference": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64"
        },
        "product_reference": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64"
        },
        "product_reference": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64"
        },
        "product_reference": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64"
        },
        "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64"
        },
        "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64"
        },
        "product_reference": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64"
        },
        "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64"
        },
        "product_reference": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64"
        },
        "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64"
        },
        "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64"
        },
        "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64"
        },
        "product_reference": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64"
        },
        "product_reference": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64"
        },
        "product_reference": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64"
        },
        "product_reference": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64"
        },
        "product_reference": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64"
        },
        "product_reference": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64"
        },
        "product_reference": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64"
        },
        "product_reference": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64"
        },
        "product_reference": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64"
        },
        "product_reference": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64"
        },
        "product_reference": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64"
        },
        "product_reference": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64"
        },
        "product_reference": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64"
        },
        "product_reference": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64"
        },
        "product_reference": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64"
        },
        "product_reference": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64"
        },
        "product_reference": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64"
        },
        "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64"
        },
        "product_reference": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64"
        },
        "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64"
        },
        "product_reference": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64"
        },
        "product_reference": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64"
        },
        "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64"
        },
        "product_reference": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64"
        },
        "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64"
        },
        "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64"
        },
        "product_reference": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64"
        },
        "product_reference": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64"
        },
        "product_reference": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64"
        },
        "product_reference": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64"
        },
        "product_reference": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64"
        },
        "product_reference": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64"
        },
        "product_reference": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64"
        },
        "product_reference": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64"
        },
        "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64"
        },
        "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64"
        },
        "product_reference": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64"
        },
        "product_reference": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64"
        },
        "product_reference": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64"
        },
        "product_reference": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64"
        },
        "product_reference": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64"
        },
        "product_reference": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64"
        },
        "product_reference": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64"
        },
        "product_reference": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64"
        },
        "product_reference": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64"
        },
        "product_reference": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64"
        },
        "product_reference": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64"
        },
        "product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64"
        },
        "product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64"
        },
        "product_reference": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64"
        },
        "product_reference": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64"
        },
        "product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
        },
        "product_reference": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-11840",
      "cwe": {
        "id": "CWE-330",
        "name": "Use of Insufficiently Random Values"
      },
      "discovery_date": "2019-03-21T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1691529"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages. If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang.org/x/crypto: Keystream loop in amd64 assembly when overflowing 32-bit counter",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64"
        ],
        "known_not_affected": [
          "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-11840"
        },
        {
          "category": "external",
          "summary": "RHBZ#1691529",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691529"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11840",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-11840"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11840",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11840"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/tjyNcJxb2vQ/n0NRBziSCAAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/tjyNcJxb2vQ/n0NRBziSCAAJ"
        }
      ],
      "release_date": "2019-03-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-01-23T11:03:26+00:00",
          "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.",
          "product_ids": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2020:0062"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang.org/x/crypto: Keystream loop in amd64 assembly when overflowing 32-bit counter"
    },
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64"
        ],
        "known_not_affected": [
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-01-23T11:03:26+00:00",
          "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.",
          "product_ids": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2020:0062"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    }
  ]
}
  RHSA-2020:0101
Vulnerability from csaf_redhat
Published
2020-01-14 08:45
    Modified
2025-10-15 11:13
    Summary
Red Hat Security Advisory: go-toolset-1.12-golang security update
    Notes
Topic
An update for go-toolset-1.12 and go-toolset-1.12-golang is now available for Red Hat Developer Tools.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
The following packages have been upgraded to a later upstream version: go-toolset-1.12-golang (1.12.12). (BZ#1759840, BZ#1785389)
Security Fix(es):
* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)
* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for go-toolset-1.12 and go-toolset-1.12-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nThe following packages have been upgraded to a later upstream version: go-toolset-1.12-golang (1.12.12). (BZ#1759840, BZ#1785389)\n\nSecurity Fix(es):\n\n* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)\n\n* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:0101",
        "url": "https://access.redhat.com/errata/RHSA-2020:0101"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1755969",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
      },
      {
        "category": "external",
        "summary": "1763310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763310"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0101.json"
      }
    ],
    "title": "Red Hat Security Advisory: go-toolset-1.12-golang security update",
    "tracking": {
      "current_release_date": "2025-10-15T11:13:18+00:00",
      "generator": {
        "date": "2025-10-15T11:13:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2020:0101",
      "initial_release_date": "2020-01-14T08:45:49+00:00",
      "revision_history": [
        {
          "date": "2020-01-14T08:45:49+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-01-14T08:45:49+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-15T11:13:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-DevTools-2019.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:devtools:2019"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-DevTools-2019.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:devtools:2019"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Developer Tools"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-bin@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-misc@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-race@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-src@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-tests@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-build@1.12.12-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
                "product": {
                  "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
                  "product_id": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-runtime@1.12.12-4.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
                "product": {
                  "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
                  "product_id": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang@1.12.12-4.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-0:1.12.12-4.el7.src",
                "product": {
                  "name": "go-toolset-1.12-0:1.12.12-4.el7.src",
                  "product_id": "go-toolset-1.12-0:1.12.12-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12@1.12.12-4.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
                "product": {
                  "name": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
                  "product_id": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-docs@1.12.12-4.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-bin@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-misc@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-src@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-tests@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-build@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
                "product": {
                  "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
                  "product_id": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-runtime@1.12.12-4.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-bin@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-misc@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-src@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-golang-tests@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-build@1.12.12-4.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
                "product": {
                  "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
                  "product_id": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset-1.12-runtime@1.12.12-4.el7?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.src",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch"
        },
        "product_reference": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Server-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.src",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.src",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch"
        },
        "product_reference": "go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
        },
        "product_reference": "go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
        "relates_to_product_reference": "7Workstation-DevTools-2019.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-01-14T08:45:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0101"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    },
    {
      "cve": "CVE-2019-17596",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "discovery_date": "2019-10-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1763310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: invalid public key causes panic in dsa.Verify",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
          "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
          "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
          "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "RHBZ#1763310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17596",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17596",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ"
        }
      ],
      "release_date": "2019-10-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-01-14T08:45:49+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0101"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Server-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-build-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.src",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-bin-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-docs-0:1.12.12-4.el7.noarch",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-misc-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-race-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-src-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-golang-tests-0:1.12.12-4.el7.x86_64",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.ppc64le",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.s390x",
            "7Workstation-DevTools-2019.4:go-toolset-1.12-runtime-0:1.12.12-4.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: invalid public key causes panic in dsa.Verify"
    }
  ]
}
  rhba-2020_0062
Vulnerability from csaf_redhat
Published
2020-01-23 11:03
    Modified
2024-11-22 13:45
    Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3 image release advisory
    Notes
Topic
Red Hat OpenShift Container Platform release 4.3.0, which fixes several bugs and includes various enhancements, is now available.
    Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat
OpenShift Container Platform 4.3.0. See the following advisory for the
RPM packages for this release:
https://access.redhat.com/errata/RHBA-2020:0063
Space precludes documenting all of the bug fixes and enhancements in this
advisory, as well as all of the container images in this advisory. See the
following Release Notes documentation, which will be updated shortly for
this release, for details about these changes:
https://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-release-notes.html
You may download the oc tool and use it to inspect release image metadata as follows:
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.3.0-x86_64
The image digest is sha256:3a516480dfd68e0f87f702b4d7bdd6f6a0acfdac5cd2e9767b838ceede34d70d
All OpenShift Container Platform 4.3 users are advised to upgrade to these
updated packages and images.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat OpenShift Container Platform release 4.3.0, which fixes several bugs and includes various enhancements, is now available.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat\nOpenShift Container Platform 4.3.0. See the following advisory for the\nRPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2020:0063\n\nSpace precludes documenting all of the bug fixes and enhancements in this\nadvisory, as well as all of the container images in this advisory. See the\nfollowing Release Notes documentation, which will be updated shortly for\nthis release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.3/release_notes/ocp-4-3-release-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata as follows:\n\n$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.3.0-x86_64\n\nThe image digest is sha256:3a516480dfd68e0f87f702b4d7bdd6f6a0acfdac5cd2e9767b838ceede34d70d\n\nAll OpenShift Container Platform 4.3 users are advised to upgrade to these\nupdated packages and images.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2020:0062",
        "url": "https://access.redhat.com/errata/RHBA-2020:0062"
      },
      {
        "category": "external",
        "summary": "1540560",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540560"
      },
      {
        "category": "external",
        "summary": "1542325",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542325"
      },
      {
        "category": "external",
        "summary": "1619479",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619479"
      },
      {
        "category": "external",
        "summary": "1665368",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665368"
      },
      {
        "category": "external",
        "summary": "1665828",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665828"
      },
      {
        "category": "external",
        "summary": "1674407",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1674407"
      },
      {
        "category": "external",
        "summary": "1683057",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683057"
      },
      {
        "category": "external",
        "summary": "1684079",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1684079"
      },
      {
        "category": "external",
        "summary": "1685189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685189"
      },
      {
        "category": "external",
        "summary": "1685338",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685338"
      },
      {
        "category": "external",
        "summary": "1688613",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688613"
      },
      {
        "category": "external",
        "summary": "1690588",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690588"
      },
      {
        "category": "external",
        "summary": "1691190",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691190"
      },
      {
        "category": "external",
        "summary": "1692227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692227"
      },
      {
        "category": "external",
        "summary": "1693169",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693169"
      },
      {
        "category": "external",
        "summary": "1698829",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698829"
      },
      {
        "category": "external",
        "summary": "1701495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701495"
      },
      {
        "category": "external",
        "summary": "1704961",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704961"
      },
      {
        "category": "external",
        "summary": "1706103",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1706103"
      },
      {
        "category": "external",
        "summary": "1707006",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707006"
      },
      {
        "category": "external",
        "summary": "1707403",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707403"
      },
      {
        "category": "external",
        "summary": "1707785",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707785"
      },
      {
        "category": "external",
        "summary": "1707905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707905"
      },
      {
        "category": "external",
        "summary": "1710939",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710939"
      },
      {
        "category": "external",
        "summary": "1711535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711535"
      },
      {
        "category": "external",
        "summary": "1711538",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711538"
      },
      {
        "category": "external",
        "summary": "1711544",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711544"
      },
      {
        "category": "external",
        "summary": "1711600",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711600"
      },
      {
        "category": "external",
        "summary": "1712068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712068"
      },
      {
        "category": "external",
        "summary": "1712697",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712697"
      },
      {
        "category": "external",
        "summary": "1713134",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713134"
      },
      {
        "category": "external",
        "summary": "1713193",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713193"
      },
      {
        "category": "external",
        "summary": "1713263",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713263"
      },
      {
        "category": "external",
        "summary": "1715001",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715001"
      },
      {
        "category": "external",
        "summary": "1716550",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716550"
      },
      {
        "category": "external",
        "summary": "1717255",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717255"
      },
      {
        "category": "external",
        "summary": "1717461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717461"
      },
      {
        "category": "external",
        "summary": "1722811",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722811"
      },
      {
        "category": "external",
        "summary": "1722878",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722878"
      },
      {
        "category": "external",
        "summary": "1723248",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723248"
      },
      {
        "category": "external",
        "summary": "1723254",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723254"
      },
      {
        "category": "external",
        "summary": "1723400",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723400"
      },
      {
        "category": "external",
        "summary": "1723948",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723948"
      },
      {
        "category": "external",
        "summary": "1723955",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723955"
      },
      {
        "category": "external",
        "summary": "1725006",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725006"
      },
      {
        "category": "external",
        "summary": "1725517",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725517"
      },
      {
        "category": "external",
        "summary": "1725977",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725977"
      },
      {
        "category": "external",
        "summary": "1727781",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727781"
      },
      {
        "category": "external",
        "summary": "1730401",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730401"
      },
      {
        "category": "external",
        "summary": "1731228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731228"
      },
      {
        "category": "external",
        "summary": "1731480",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731480"
      },
      {
        "category": "external",
        "summary": "1733594",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733594"
      },
      {
        "category": "external",
        "summary": "1734029",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734029"
      },
      {
        "category": "external",
        "summary": "1734270",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734270"
      },
      {
        "category": "external",
        "summary": "1734319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734319"
      },
      {
        "category": "external",
        "summary": "1734539",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734539"
      },
      {
        "category": "external",
        "summary": "1735509",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735509"
      },
      {
        "category": "external",
        "summary": "1735548",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735548"
      },
      {
        "category": "external",
        "summary": "1735691",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735691"
      },
      {
        "category": "external",
        "summary": "1736254",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1736254"
      },
      {
        "category": "external",
        "summary": "1736793",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1736793"
      },
      {
        "category": "external",
        "summary": "1736806",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1736806"
      },
      {
        "category": "external",
        "summary": "1737097",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737097"
      },
      {
        "category": "external",
        "summary": "1737392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737392"
      },
      {
        "category": "external",
        "summary": "1737630",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737630"
      },
      {
        "category": "external",
        "summary": "1738360",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738360"
      },
      {
        "category": "external",
        "summary": "1738374",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738374"
      },
      {
        "category": "external",
        "summary": "1739375",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739375"
      },
      {
        "category": "external",
        "summary": "1739447",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739447"
      },
      {
        "category": "external",
        "summary": "1740357",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740357"
      },
      {
        "category": "external",
        "summary": "1740374",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740374"
      },
      {
        "category": "external",
        "summary": "1740375",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740375"
      },
      {
        "category": "external",
        "summary": "1741120",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741120"
      },
      {
        "category": "external",
        "summary": "1741265",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741265"
      },
      {
        "category": "external",
        "summary": "1741391",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741391"
      },
      {
        "category": "external",
        "summary": "1741685",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741685"
      },
      {
        "category": "external",
        "summary": "1743459",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743459"
      },
      {
        "category": "external",
        "summary": "1743514",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743514"
      },
      {
        "category": "external",
        "summary": "1743938",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743938"
      },
      {
        "category": "external",
        "summary": "1744046",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744046"
      },
      {
        "category": "external",
        "summary": "1744462",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744462"
      },
      {
        "category": "external",
        "summary": "1744909",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744909"
      },
      {
        "category": "external",
        "summary": "1745028",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745028"
      },
      {
        "category": "external",
        "summary": "1745102",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745102"
      },
      {
        "category": "external",
        "summary": "1745192",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745192"
      },
      {
        "category": "external",
        "summary": "1745671",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745671"
      },
      {
        "category": "external",
        "summary": "1745773",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745773"
      },
      {
        "category": "external",
        "summary": "1745910",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1745910"
      },
      {
        "category": "external",
        "summary": "1746222",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746222"
      },
      {
        "category": "external",
        "summary": "1746406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746406"
      },
      {
        "category": "external",
        "summary": "1746854",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746854"
      },
      {
        "category": "external",
        "summary": "1746871",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746871"
      },
      {
        "category": "external",
        "summary": "1748452",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748452"
      },
      {
        "category": "external",
        "summary": "1748478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748478"
      },
      {
        "category": "external",
        "summary": "1748777",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748777"
      },
      {
        "category": "external",
        "summary": "1749144",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749144"
      },
      {
        "category": "external",
        "summary": "1749256",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749256"
      },
      {
        "category": "external",
        "summary": "1749910",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749910"
      },
      {
        "category": "external",
        "summary": "1750494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750494"
      },
      {
        "category": "external",
        "summary": "1750675",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750675"
      },
      {
        "category": "external",
        "summary": "1750890",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750890"
      },
      {
        "category": "external",
        "summary": "1751124",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751124"
      },
      {
        "category": "external",
        "summary": "1751246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751246"
      },
      {
        "category": "external",
        "summary": "1751458",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751458"
      },
      {
        "category": "external",
        "summary": "1751513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751513"
      },
      {
        "category": "external",
        "summary": "1751602",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751602"
      },
      {
        "category": "external",
        "summary": "1751640",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751640"
      },
      {
        "category": "external",
        "summary": "1751641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751641"
      },
      {
        "category": "external",
        "summary": "1751654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751654"
      },
      {
        "category": "external",
        "summary": "1751756",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751756"
      },
      {
        "category": "external",
        "summary": "1751820",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751820"
      },
      {
        "category": "external",
        "summary": "1752045",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752045"
      },
      {
        "category": "external",
        "summary": "1752144",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752144"
      },
      {
        "category": "external",
        "summary": "1752222",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752222"
      },
      {
        "category": "external",
        "summary": "1752636",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752636"
      },
      {
        "category": "external",
        "summary": "1752646",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752646"
      },
      {
        "category": "external",
        "summary": "1752744",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752744"
      },
      {
        "category": "external",
        "summary": "1752929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752929"
      },
      {
        "category": "external",
        "summary": "1753059",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753059"
      },
      {
        "category": "external",
        "summary": "1753067",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753067"
      },
      {
        "category": "external",
        "summary": "1753124",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753124"
      },
      {
        "category": "external",
        "summary": "1753187",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753187"
      },
      {
        "category": "external",
        "summary": "1753216",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753216"
      },
      {
        "category": "external",
        "summary": "1753232",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753232"
      },
      {
        "category": "external",
        "summary": "1753265",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753265"
      },
      {
        "category": "external",
        "summary": "1753419",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753419"
      },
      {
        "category": "external",
        "summary": "1753467",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753467"
      },
      {
        "category": "external",
        "summary": "1753472",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753472"
      },
      {
        "category": "external",
        "summary": "1753568",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753568"
      },
      {
        "category": "external",
        "summary": "1753618",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753618"
      },
      {
        "category": "external",
        "summary": "1753688",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753688"
      },
      {
        "category": "external",
        "summary": "1753731",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753731"
      },
      {
        "category": "external",
        "summary": "1753734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753734"
      },
      {
        "category": "external",
        "summary": "1753778",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753778"
      },
      {
        "category": "external",
        "summary": "1753812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753812"
      },
      {
        "category": "external",
        "summary": "1753884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753884"
      },
      {
        "category": "external",
        "summary": "1753930",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753930"
      },
      {
        "category": "external",
        "summary": "1753936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753936"
      },
      {
        "category": "external",
        "summary": "1753953",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753953"
      },
      {
        "category": "external",
        "summary": "1754042",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754042"
      },
      {
        "category": "external",
        "summary": "1754049",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754049"
      },
      {
        "category": "external",
        "summary": "1754070",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754070"
      },
      {
        "category": "external",
        "summary": "1754154",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754154"
      },
      {
        "category": "external",
        "summary": "1754412",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754412"
      },
      {
        "category": "external",
        "summary": "1754452",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754452"
      },
      {
        "category": "external",
        "summary": "1754542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754542"
      },
      {
        "category": "external",
        "summary": "1754569",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754569"
      },
      {
        "category": "external",
        "summary": "1754592",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754592"
      },
      {
        "category": "external",
        "summary": "1754631",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754631"
      },
      {
        "category": "external",
        "summary": "1754640",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754640"
      },
      {
        "category": "external",
        "summary": "1754644",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754644"
      },
      {
        "category": "external",
        "summary": "1754647",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754647"
      },
      {
        "category": "external",
        "summary": "1754682",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754682"
      },
      {
        "category": "external",
        "summary": "1754738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754738"
      },
      {
        "category": "external",
        "summary": "1754789",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754789"
      },
      {
        "category": "external",
        "summary": "1754840",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754840"
      },
      {
        "category": "external",
        "summary": "1754939",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754939"
      },
      {
        "category": "external",
        "summary": "1755000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755000"
      },
      {
        "category": "external",
        "summary": "1755115",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755115"
      },
      {
        "category": "external",
        "summary": "1755130",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755130"
      },
      {
        "category": "external",
        "summary": "1755240",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755240"
      },
      {
        "category": "external",
        "summary": "1755383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755383"
      },
      {
        "category": "external",
        "summary": "1755469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755469"
      },
      {
        "category": "external",
        "summary": "1755552",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755552"
      },
      {
        "category": "external",
        "summary": "1755560",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755560"
      },
      {
        "category": "external",
        "summary": "1755606",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755606"
      },
      {
        "category": "external",
        "summary": "1755699",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755699"
      },
      {
        "category": "external",
        "summary": "1755784",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755784"
      },
      {
        "category": "external",
        "summary": "1755812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755812"
      },
      {
        "category": "external",
        "summary": "1755936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755936"
      },
      {
        "category": "external",
        "summary": "1755991",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755991"
      },
      {
        "category": "external",
        "summary": "1756107",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756107"
      },
      {
        "category": "external",
        "summary": "1756108",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756108"
      },
      {
        "category": "external",
        "summary": "1756132",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756132"
      },
      {
        "category": "external",
        "summary": "1756189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756189"
      },
      {
        "category": "external",
        "summary": "1756298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756298"
      },
      {
        "category": "external",
        "summary": "1756302",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756302"
      },
      {
        "category": "external",
        "summary": "1756312",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756312"
      },
      {
        "category": "external",
        "summary": "1756319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756319"
      },
      {
        "category": "external",
        "summary": "1756344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756344"
      },
      {
        "category": "external",
        "summary": "1756417",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756417"
      },
      {
        "category": "external",
        "summary": "1756421",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756421"
      },
      {
        "category": "external",
        "summary": "1756442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756442"
      },
      {
        "category": "external",
        "summary": "1756453",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756453"
      },
      {
        "category": "external",
        "summary": "1756461",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756461"
      },
      {
        "category": "external",
        "summary": "1756471",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756471"
      },
      {
        "category": "external",
        "summary": "1756475",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756475"
      },
      {
        "category": "external",
        "summary": "1756500",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756500"
      },
      {
        "category": "external",
        "summary": "1756542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756542"
      },
      {
        "category": "external",
        "summary": "1756548",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756548"
      },
      {
        "category": "external",
        "summary": "1756669",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756669"
      },
      {
        "category": "external",
        "summary": "1756981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756981"
      },
      {
        "category": "external",
        "summary": "1757099",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757099"
      },
      {
        "category": "external",
        "summary": "1757110",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757110"
      },
      {
        "category": "external",
        "summary": "1757141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757141"
      },
      {
        "category": "external",
        "summary": "1757319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757319"
      },
      {
        "category": "external",
        "summary": "1757424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757424"
      },
      {
        "category": "external",
        "summary": "1757503",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757503"
      },
      {
        "category": "external",
        "summary": "1757526",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757526"
      },
      {
        "category": "external",
        "summary": "1757547",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757547"
      },
      {
        "category": "external",
        "summary": "1757752",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757752"
      },
      {
        "category": "external",
        "summary": "1757777",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757777"
      },
      {
        "category": "external",
        "summary": "1757836",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757836"
      },
      {
        "category": "external",
        "summary": "1757973",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757973"
      },
      {
        "category": "external",
        "summary": "1757975",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757975"
      },
      {
        "category": "external",
        "summary": "1758008",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758008"
      },
      {
        "category": "external",
        "summary": "1758031",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758031"
      },
      {
        "category": "external",
        "summary": "1758091",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758091"
      },
      {
        "category": "external",
        "summary": "1758306",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758306"
      },
      {
        "category": "external",
        "summary": "1758343",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758343"
      },
      {
        "category": "external",
        "summary": "1758434",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758434"
      },
      {
        "category": "external",
        "summary": "1758500",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758500"
      },
      {
        "category": "external",
        "summary": "1758528",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758528"
      },
      {
        "category": "external",
        "summary": "1758543",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758543"
      },
      {
        "category": "external",
        "summary": "1758606",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758606"
      },
      {
        "category": "external",
        "summary": "1758623",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758623"
      },
      {
        "category": "external",
        "summary": "1758628",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758628"
      },
      {
        "category": "external",
        "summary": "1758666",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758666"
      },
      {
        "category": "external",
        "summary": "1758687",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758687"
      },
      {
        "category": "external",
        "summary": "1759095",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759095"
      },
      {
        "category": "external",
        "summary": "1759169",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759169"
      },
      {
        "category": "external",
        "summary": "1759185",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759185"
      },
      {
        "category": "external",
        "summary": "1759248",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759248"
      },
      {
        "category": "external",
        "summary": "1759299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759299"
      },
      {
        "category": "external",
        "summary": "1759363",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759363"
      },
      {
        "category": "external",
        "summary": "1759469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759469"
      },
      {
        "category": "external",
        "summary": "1759487",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759487"
      },
      {
        "category": "external",
        "summary": "1759494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759494"
      },
      {
        "category": "external",
        "summary": "1759659",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759659"
      },
      {
        "category": "external",
        "summary": "1759880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759880"
      },
      {
        "category": "external",
        "summary": "1759920",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759920"
      },
      {
        "category": "external",
        "summary": "1759945",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759945"
      },
      {
        "category": "external",
        "summary": "1759965",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759965"
      },
      {
        "category": "external",
        "summary": "1759971",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759971"
      },
      {
        "category": "external",
        "summary": "1759984",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759984"
      },
      {
        "category": "external",
        "summary": "1759998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759998"
      },
      {
        "category": "external",
        "summary": "1760103",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760103"
      },
      {
        "category": "external",
        "summary": "1760393",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760393"
      },
      {
        "category": "external",
        "summary": "1760425",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760425"
      },
      {
        "category": "external",
        "summary": "1760478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760478"
      },
      {
        "category": "external",
        "summary": "1760479",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760479"
      },
      {
        "category": "external",
        "summary": "1760494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760494"
      },
      {
        "category": "external",
        "summary": "1760665",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760665"
      },
      {
        "category": "external",
        "summary": "1760787",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760787"
      },
      {
        "category": "external",
        "summary": "1760810",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760810"
      },
      {
        "category": "external",
        "summary": "1760827",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760827"
      },
      {
        "category": "external",
        "summary": "1760836",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760836"
      },
      {
        "category": "external",
        "summary": "1760858",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760858"
      },
      {
        "category": "external",
        "summary": "1761041",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761041"
      },
      {
        "category": "external",
        "summary": "1761049",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761049"
      },
      {
        "category": "external",
        "summary": "1761276",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761276"
      },
      {
        "category": "external",
        "summary": "1761344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761344"
      },
      {
        "category": "external",
        "summary": "1761348",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761348"
      },
      {
        "category": "external",
        "summary": "1761372",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761372"
      },
      {
        "category": "external",
        "summary": "1761505",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761505"
      },
      {
        "category": "external",
        "summary": "1761506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761506"
      },
      {
        "category": "external",
        "summary": "1761557",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761557"
      },
      {
        "category": "external",
        "summary": "1761682",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761682"
      },
      {
        "category": "external",
        "summary": "1761689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761689"
      },
      {
        "category": "external",
        "summary": "1761721",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761721"
      },
      {
        "category": "external",
        "summary": "1761815",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761815"
      },
      {
        "category": "external",
        "summary": "1761871",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761871"
      },
      {
        "category": "external",
        "summary": "1761921",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761921"
      },
      {
        "category": "external",
        "summary": "1761924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761924"
      },
      {
        "category": "external",
        "summary": "1761925",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761925"
      },
      {
        "category": "external",
        "summary": "1762137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762137"
      },
      {
        "category": "external",
        "summary": "1762145",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762145"
      },
      {
        "category": "external",
        "summary": "1762149",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762149"
      },
      {
        "category": "external",
        "summary": "1762162",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762162"
      },
      {
        "category": "external",
        "summary": "1762217",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762217"
      },
      {
        "category": "external",
        "summary": "1762298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762298"
      },
      {
        "category": "external",
        "summary": "1762343",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762343"
      },
      {
        "category": "external",
        "summary": "1762413",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762413"
      },
      {
        "category": "external",
        "summary": "1762536",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762536"
      },
      {
        "category": "external",
        "summary": "1762614",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762614"
      },
      {
        "category": "external",
        "summary": "1762618",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762618"
      },
      {
        "category": "external",
        "summary": "1762653",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762653"
      },
      {
        "category": "external",
        "summary": "1762769",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762769"
      },
      {
        "category": "external",
        "summary": "1762787",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762787"
      },
      {
        "category": "external",
        "summary": "1762841",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762841"
      },
      {
        "category": "external",
        "summary": "1762868",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762868"
      },
      {
        "category": "external",
        "summary": "1762888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762888"
      },
      {
        "category": "external",
        "summary": "1762968",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762968"
      },
      {
        "category": "external",
        "summary": "1762979",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762979"
      },
      {
        "category": "external",
        "summary": "1763005",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763005"
      },
      {
        "category": "external",
        "summary": "1763056",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763056"
      },
      {
        "category": "external",
        "summary": "1763078",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763078"
      },
      {
        "category": "external",
        "summary": "1763091",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763091"
      },
      {
        "category": "external",
        "summary": "1763278",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763278"
      },
      {
        "category": "external",
        "summary": "1763293",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763293"
      },
      {
        "category": "external",
        "summary": "1763303",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763303"
      },
      {
        "category": "external",
        "summary": "1763306",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763306"
      },
      {
        "category": "external",
        "summary": "1763341",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763341"
      },
      {
        "category": "external",
        "summary": "1763605",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763605"
      },
      {
        "category": "external",
        "summary": "1763635",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763635"
      },
      {
        "category": "external",
        "summary": "1763639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763639"
      },
      {
        "category": "external",
        "summary": "1763700",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763700"
      },
      {
        "category": "external",
        "summary": "1763725",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763725"
      },
      {
        "category": "external",
        "summary": "1763727",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763727"
      },
      {
        "category": "external",
        "summary": "1763728",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763728"
      },
      {
        "category": "external",
        "summary": "1763807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763807"
      },
      {
        "category": "external",
        "summary": "1763821",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763821"
      },
      {
        "category": "external",
        "summary": "1763836",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763836"
      },
      {
        "category": "external",
        "summary": "1763849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763849"
      },
      {
        "category": "external",
        "summary": "1763927",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763927"
      },
      {
        "category": "external",
        "summary": "1763929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763929"
      },
      {
        "category": "external",
        "summary": "1764017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764017"
      },
      {
        "category": "external",
        "summary": "1764076",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764076"
      },
      {
        "category": "external",
        "summary": "1764079",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764079"
      },
      {
        "category": "external",
        "summary": "1764081",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764081"
      },
      {
        "category": "external",
        "summary": "1764092",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764092"
      },
      {
        "category": "external",
        "summary": "1764216",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764216"
      },
      {
        "category": "external",
        "summary": "1764219",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764219"
      },
      {
        "category": "external",
        "summary": "1764224",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764224"
      },
      {
        "category": "external",
        "summary": "1764313",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764313"
      },
      {
        "category": "external",
        "summary": "1764323",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764323"
      },
      {
        "category": "external",
        "summary": "1764411",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764411"
      },
      {
        "category": "external",
        "summary": "1764414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764414"
      },
      {
        "category": "external",
        "summary": "1764491",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764491"
      },
      {
        "category": "external",
        "summary": "1764498",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764498"
      },
      {
        "category": "external",
        "summary": "1764556",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764556"
      },
      {
        "category": "external",
        "summary": "1764558",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764558"
      },
      {
        "category": "external",
        "summary": "1764704",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764704"
      },
      {
        "category": "external",
        "summary": "1764728",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764728"
      },
      {
        "category": "external",
        "summary": "1765009",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765009"
      },
      {
        "category": "external",
        "summary": "1765015",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765015"
      },
      {
        "category": "external",
        "summary": "1765068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765068"
      },
      {
        "category": "external",
        "summary": "1765083",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765083"
      },
      {
        "category": "external",
        "summary": "1765177",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765177"
      },
      {
        "category": "external",
        "summary": "1765219",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765219"
      },
      {
        "category": "external",
        "summary": "1765261",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765261"
      },
      {
        "category": "external",
        "summary": "1765269",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765269"
      },
      {
        "category": "external",
        "summary": "1765282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765282"
      },
      {
        "category": "external",
        "summary": "1765315",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765315"
      },
      {
        "category": "external",
        "summary": "1765427",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765427"
      },
      {
        "category": "external",
        "summary": "1765457",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765457"
      },
      {
        "category": "external",
        "summary": "1765458",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765458"
      },
      {
        "category": "external",
        "summary": "1765733",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765733"
      },
      {
        "category": "external",
        "summary": "1765738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765738"
      },
      {
        "category": "external",
        "summary": "1765749",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765749"
      },
      {
        "category": "external",
        "summary": "1765756",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765756"
      },
      {
        "category": "external",
        "summary": "1765803",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765803"
      },
      {
        "category": "external",
        "summary": "1766111",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766111"
      },
      {
        "category": "external",
        "summary": "1766141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766141"
      },
      {
        "category": "external",
        "summary": "1766181",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766181"
      },
      {
        "category": "external",
        "summary": "1766187",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766187"
      },
      {
        "category": "external",
        "summary": "1766339",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766339"
      },
      {
        "category": "external",
        "summary": "1766356",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766356"
      },
      {
        "category": "external",
        "summary": "1766446",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766446"
      },
      {
        "category": "external",
        "summary": "1766482",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766482"
      },
      {
        "category": "external",
        "summary": "1766513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766513"
      },
      {
        "category": "external",
        "summary": "1766587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766587"
      },
      {
        "category": "external",
        "summary": "1766607",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766607"
      },
      {
        "category": "external",
        "summary": "1766632",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766632"
      },
      {
        "category": "external",
        "summary": "1766638",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766638"
      },
      {
        "category": "external",
        "summary": "1766739",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766739"
      },
      {
        "category": "external",
        "summary": "1766747",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766747"
      },
      {
        "category": "external",
        "summary": "1766792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766792"
      },
      {
        "category": "external",
        "summary": "1766851",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766851"
      },
      {
        "category": "external",
        "summary": "1766856",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766856"
      },
      {
        "category": "external",
        "summary": "1766907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766907"
      },
      {
        "category": "external",
        "summary": "1766918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766918"
      },
      {
        "category": "external",
        "summary": "1766949",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766949"
      },
      {
        "category": "external",
        "summary": "1766984",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766984"
      },
      {
        "category": "external",
        "summary": "1767004",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767004"
      },
      {
        "category": "external",
        "summary": "1767014",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767014"
      },
      {
        "category": "external",
        "summary": "1767156",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767156"
      },
      {
        "category": "external",
        "summary": "1767163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767163"
      },
      {
        "category": "external",
        "summary": "1767218",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767218"
      },
      {
        "category": "external",
        "summary": "1767219",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767219"
      },
      {
        "category": "external",
        "summary": "1767295",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767295"
      },
      {
        "category": "external",
        "summary": "1767547",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767547"
      },
      {
        "category": "external",
        "summary": "1767629",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767629"
      },
      {
        "category": "external",
        "summary": "1767675",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767675"
      },
      {
        "category": "external",
        "summary": "1767853",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767853"
      },
      {
        "category": "external",
        "summary": "1767926",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767926"
      },
      {
        "category": "external",
        "summary": "1767954",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767954"
      },
      {
        "category": "external",
        "summary": "1767964",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767964"
      },
      {
        "category": "external",
        "summary": "1768002",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768002"
      },
      {
        "category": "external",
        "summary": "1768262",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768262"
      },
      {
        "category": "external",
        "summary": "1768298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768298"
      },
      {
        "category": "external",
        "summary": "1768315",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768315"
      },
      {
        "category": "external",
        "summary": "1768328",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768328"
      },
      {
        "category": "external",
        "summary": "1768333",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768333"
      },
      {
        "category": "external",
        "summary": "1768341",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768341"
      },
      {
        "category": "external",
        "summary": "1768346",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768346"
      },
      {
        "category": "external",
        "summary": "1768350",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768350"
      },
      {
        "category": "external",
        "summary": "1768357",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768357"
      },
      {
        "category": "external",
        "summary": "1768359",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768359"
      },
      {
        "category": "external",
        "summary": "1768417",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768417"
      },
      {
        "category": "external",
        "summary": "1768442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768442"
      },
      {
        "category": "external",
        "summary": "1768474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768474"
      },
      {
        "category": "external",
        "summary": "1768483",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768483"
      },
      {
        "category": "external",
        "summary": "1768492",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768492"
      },
      {
        "category": "external",
        "summary": "1768507",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768507"
      },
      {
        "category": "external",
        "summary": "1768516",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768516"
      },
      {
        "category": "external",
        "summary": "1768537",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768537"
      },
      {
        "category": "external",
        "summary": "1768542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768542"
      },
      {
        "category": "external",
        "summary": "1768564",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768564"
      },
      {
        "category": "external",
        "summary": "1768568",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768568"
      },
      {
        "category": "external",
        "summary": "1768599",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768599"
      },
      {
        "category": "external",
        "summary": "1768611",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768611"
      },
      {
        "category": "external",
        "summary": "1768614",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768614"
      },
      {
        "category": "external",
        "summary": "1768616",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768616"
      },
      {
        "category": "external",
        "summary": "1768639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768639"
      },
      {
        "category": "external",
        "summary": "1768654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768654"
      },
      {
        "category": "external",
        "summary": "1768662",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768662"
      },
      {
        "category": "external",
        "summary": "1768684",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768684"
      },
      {
        "category": "external",
        "summary": "1768685",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768685"
      },
      {
        "category": "external",
        "summary": "1768688",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768688"
      },
      {
        "category": "external",
        "summary": "1768701",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768701"
      },
      {
        "category": "external",
        "summary": "1768716",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768716"
      },
      {
        "category": "external",
        "summary": "1768723",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768723"
      },
      {
        "category": "external",
        "summary": "1768765",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768765"
      },
      {
        "category": "external",
        "summary": "1768769",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768769"
      },
      {
        "category": "external",
        "summary": "1768771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768771"
      },
      {
        "category": "external",
        "summary": "1768782",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768782"
      },
      {
        "category": "external",
        "summary": "1768814",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768814"
      },
      {
        "category": "external",
        "summary": "1768820",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768820"
      },
      {
        "category": "external",
        "summary": "1768877",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768877"
      },
      {
        "category": "external",
        "summary": "1768905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768905"
      },
      {
        "category": "external",
        "summary": "1768926",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768926"
      },
      {
        "category": "external",
        "summary": "1768936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768936"
      },
      {
        "category": "external",
        "summary": "1768938",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768938"
      },
      {
        "category": "external",
        "summary": "1769005",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769005"
      },
      {
        "category": "external",
        "summary": "1769011",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769011"
      },
      {
        "category": "external",
        "summary": "1769012",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769012"
      },
      {
        "category": "external",
        "summary": "1769013",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769013"
      },
      {
        "category": "external",
        "summary": "1769016",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769016"
      },
      {
        "category": "external",
        "summary": "1769017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769017"
      },
      {
        "category": "external",
        "summary": "1769076",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769076"
      },
      {
        "category": "external",
        "summary": "1769151",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769151"
      },
      {
        "category": "external",
        "summary": "1769157",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769157"
      },
      {
        "category": "external",
        "summary": "1769167",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769167"
      },
      {
        "category": "external",
        "summary": "1769174",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769174"
      },
      {
        "category": "external",
        "summary": "1769263",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769263"
      },
      {
        "category": "external",
        "summary": "1769303",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769303"
      },
      {
        "category": "external",
        "summary": "1769325",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769325"
      },
      {
        "category": "external",
        "summary": "1769331",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769331"
      },
      {
        "category": "external",
        "summary": "1769391",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769391"
      },
      {
        "category": "external",
        "summary": "1769395",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769395"
      },
      {
        "category": "external",
        "summary": "1769412",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769412"
      },
      {
        "category": "external",
        "summary": "1769422",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769422"
      },
      {
        "category": "external",
        "summary": "1769435",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769435"
      },
      {
        "category": "external",
        "summary": "1769455",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769455"
      },
      {
        "category": "external",
        "summary": "1769468",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769468"
      },
      {
        "category": "external",
        "summary": "1769578",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769578"
      },
      {
        "category": "external",
        "summary": "1769585",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769585"
      },
      {
        "category": "external",
        "summary": "1769601",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769601"
      },
      {
        "category": "external",
        "summary": "1769602",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769602"
      },
      {
        "category": "external",
        "summary": "1769609",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769609"
      },
      {
        "category": "external",
        "summary": "1769612",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769612"
      },
      {
        "category": "external",
        "summary": "1769615",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769615"
      },
      {
        "category": "external",
        "summary": "1769641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769641"
      },
      {
        "category": "external",
        "summary": "1769645",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769645"
      },
      {
        "category": "external",
        "summary": "1769647",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769647"
      },
      {
        "category": "external",
        "summary": "1769700",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769700"
      },
      {
        "category": "external",
        "summary": "1769704",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769704"
      },
      {
        "category": "external",
        "summary": "1769742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769742"
      },
      {
        "category": "external",
        "summary": "1769768",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769768"
      },
      {
        "category": "external",
        "summary": "1769779",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769779"
      },
      {
        "category": "external",
        "summary": "1769793",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769793"
      },
      {
        "category": "external",
        "summary": "1769807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769807"
      },
      {
        "category": "external",
        "summary": "1769915",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769915"
      },
      {
        "category": "external",
        "summary": "1769949",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769949"
      },
      {
        "category": "external",
        "summary": "1769962",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769962"
      },
      {
        "category": "external",
        "summary": "1769985",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1769985"
      },
      {
        "category": "external",
        "summary": "1770003",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770003"
      },
      {
        "category": "external",
        "summary": "1770006",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770006"
      },
      {
        "category": "external",
        "summary": "1770084",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770084"
      },
      {
        "category": "external",
        "summary": "1770101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770101"
      },
      {
        "category": "external",
        "summary": "1770108",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770108"
      },
      {
        "category": "external",
        "summary": "1770109",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770109"
      },
      {
        "category": "external",
        "summary": "1770144",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770144"
      },
      {
        "category": "external",
        "summary": "1770152",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770152"
      },
      {
        "category": "external",
        "summary": "1770269",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770269"
      },
      {
        "category": "external",
        "summary": "1770273",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770273"
      },
      {
        "category": "external",
        "summary": "1770348",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770348"
      },
      {
        "category": "external",
        "summary": "1770387",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770387"
      },
      {
        "category": "external",
        "summary": "1770406",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770406"
      },
      {
        "category": "external",
        "summary": "1770441",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770441"
      },
      {
        "category": "external",
        "summary": "1770573",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770573"
      },
      {
        "category": "external",
        "summary": "1770642",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770642"
      },
      {
        "category": "external",
        "summary": "1770654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770654"
      },
      {
        "category": "external",
        "summary": "1770655",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770655"
      },
      {
        "category": "external",
        "summary": "1770665",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770665"
      },
      {
        "category": "external",
        "summary": "1770709",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770709"
      },
      {
        "category": "external",
        "summary": "1770724",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770724"
      },
      {
        "category": "external",
        "summary": "1770749",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770749"
      },
      {
        "category": "external",
        "summary": "1770757",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770757"
      },
      {
        "category": "external",
        "summary": "1770808",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770808"
      },
      {
        "category": "external",
        "summary": "1770903",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770903"
      },
      {
        "category": "external",
        "summary": "1770970",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770970"
      },
      {
        "category": "external",
        "summary": "1771003",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771003"
      },
      {
        "category": "external",
        "summary": "1771017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771017"
      },
      {
        "category": "external",
        "summary": "1771172",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771172"
      },
      {
        "category": "external",
        "summary": "1771233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771233"
      },
      {
        "category": "external",
        "summary": "1771245",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771245"
      },
      {
        "category": "external",
        "summary": "1771249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771249"
      },
      {
        "category": "external",
        "summary": "1771273",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771273"
      },
      {
        "category": "external",
        "summary": "1771321",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771321"
      },
      {
        "category": "external",
        "summary": "1771335",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771335"
      },
      {
        "category": "external",
        "summary": "1771355",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771355"
      },
      {
        "category": "external",
        "summary": "1771389",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771389"
      },
      {
        "category": "external",
        "summary": "1771431",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771431"
      },
      {
        "category": "external",
        "summary": "1771522",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771522"
      },
      {
        "category": "external",
        "summary": "1771736",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771736"
      },
      {
        "category": "external",
        "summary": "1771744",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771744"
      },
      {
        "category": "external",
        "summary": "1771783",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771783"
      },
      {
        "category": "external",
        "summary": "1771784",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771784"
      },
      {
        "category": "external",
        "summary": "1771813",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771813"
      },
      {
        "category": "external",
        "summary": "1771843",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771843"
      },
      {
        "category": "external",
        "summary": "1771850",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771850"
      },
      {
        "category": "external",
        "summary": "1771851",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771851"
      },
      {
        "category": "external",
        "summary": "1771919",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771919"
      },
      {
        "category": "external",
        "summary": "1771931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771931"
      },
      {
        "category": "external",
        "summary": "1771995",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771995"
      },
      {
        "category": "external",
        "summary": "1772000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772000"
      },
      {
        "category": "external",
        "summary": "1772002",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772002"
      },
      {
        "category": "external",
        "summary": "1772049",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772049"
      },
      {
        "category": "external",
        "summary": "1772067",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772067"
      },
      {
        "category": "external",
        "summary": "1772080",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772080"
      },
      {
        "category": "external",
        "summary": "1772094",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772094"
      },
      {
        "category": "external",
        "summary": "1772154",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772154"
      },
      {
        "category": "external",
        "summary": "1772155",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772155"
      },
      {
        "category": "external",
        "summary": "1772163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772163"
      },
      {
        "category": "external",
        "summary": "1772190",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772190"
      },
      {
        "category": "external",
        "summary": "1772317",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772317"
      },
      {
        "category": "external",
        "summary": "1772340",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772340"
      },
      {
        "category": "external",
        "summary": "1772346",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772346"
      },
      {
        "category": "external",
        "summary": "1772392",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772392"
      },
      {
        "category": "external",
        "summary": "1772451",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772451"
      },
      {
        "category": "external",
        "summary": "1772455",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772455"
      },
      {
        "category": "external",
        "summary": "1772477",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772477"
      },
      {
        "category": "external",
        "summary": "1772502",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772502"
      },
      {
        "category": "external",
        "summary": "1772509",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772509"
      },
      {
        "category": "external",
        "summary": "1772599",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772599"
      },
      {
        "category": "external",
        "summary": "1772687",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772687"
      },
      {
        "category": "external",
        "summary": "1772767",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772767"
      },
      {
        "category": "external",
        "summary": "1772796",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772796"
      },
      {
        "category": "external",
        "summary": "1772804",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772804"
      },
      {
        "category": "external",
        "summary": "1772849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772849"
      },
      {
        "category": "external",
        "summary": "1772874",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772874"
      },
      {
        "category": "external",
        "summary": "1772900",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772900"
      },
      {
        "category": "external",
        "summary": "1772912",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772912"
      },
      {
        "category": "external",
        "summary": "1773243",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773243"
      },
      {
        "category": "external",
        "summary": "1773431",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773431"
      },
      {
        "category": "external",
        "summary": "1773480",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773480"
      },
      {
        "category": "external",
        "summary": "1773634",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773634"
      },
      {
        "category": "external",
        "summary": "1773661",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773661"
      },
      {
        "category": "external",
        "summary": "1773686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773686"
      },
      {
        "category": "external",
        "summary": "1773725",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773725"
      },
      {
        "category": "external",
        "summary": "1773727",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773727"
      },
      {
        "category": "external",
        "summary": "1773733",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773733"
      },
      {
        "category": "external",
        "summary": "1773847",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773847"
      },
      {
        "category": "external",
        "summary": "1773854",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773854"
      },
      {
        "category": "external",
        "summary": "1773995",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773995"
      },
      {
        "category": "external",
        "summary": "1774060",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774060"
      },
      {
        "category": "external",
        "summary": "1774173",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774173"
      },
      {
        "category": "external",
        "summary": "1774212",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774212"
      },
      {
        "category": "external",
        "summary": "1774352",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774352"
      },
      {
        "category": "external",
        "summary": "1774353",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774353"
      },
      {
        "category": "external",
        "summary": "1774369",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774369"
      },
      {
        "category": "external",
        "summary": "1774451",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774451"
      },
      {
        "category": "external",
        "summary": "1774589",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774589"
      },
      {
        "category": "external",
        "summary": "1774630",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774630"
      },
      {
        "category": "external",
        "summary": "1774642",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774642"
      },
      {
        "category": "external",
        "summary": "1774720",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774720"
      },
      {
        "category": "external",
        "summary": "1774813",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774813"
      },
      {
        "category": "external",
        "summary": "1774837",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774837"
      },
      {
        "category": "external",
        "summary": "1774841",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774841"
      },
      {
        "category": "external",
        "summary": "1774907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774907"
      },
      {
        "category": "external",
        "summary": "1774912",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774912"
      },
      {
        "category": "external",
        "summary": "1774917",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774917"
      },
      {
        "category": "external",
        "summary": "1774930",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774930"
      },
      {
        "category": "external",
        "summary": "1774936",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774936"
      },
      {
        "category": "external",
        "summary": "1775009",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775009"
      },
      {
        "category": "external",
        "summary": "1775055",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775055"
      },
      {
        "category": "external",
        "summary": "1775119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775119"
      },
      {
        "category": "external",
        "summary": "1775131",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775131"
      },
      {
        "category": "external",
        "summary": "1775156",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775156"
      },
      {
        "category": "external",
        "summary": "1775170",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775170"
      },
      {
        "category": "external",
        "summary": "1775245",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775245"
      },
      {
        "category": "external",
        "summary": "1775279",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775279"
      },
      {
        "category": "external",
        "summary": "1775323",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775323"
      },
      {
        "category": "external",
        "summary": "1775379",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775379"
      },
      {
        "category": "external",
        "summary": "1775384",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775384"
      },
      {
        "category": "external",
        "summary": "1775527",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775527"
      },
      {
        "category": "external",
        "summary": "1775580",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775580"
      },
      {
        "category": "external",
        "summary": "1775643",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775643"
      },
      {
        "category": "external",
        "summary": "1775723",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775723"
      },
      {
        "category": "external",
        "summary": "1775730",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775730"
      },
      {
        "category": "external",
        "summary": "1775742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775742"
      },
      {
        "category": "external",
        "summary": "1775752",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775752"
      },
      {
        "category": "external",
        "summary": "1775826",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775826"
      },
      {
        "category": "external",
        "summary": "1775849",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775849"
      },
      {
        "category": "external",
        "summary": "1775874",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775874"
      },
      {
        "category": "external",
        "summary": "1775878",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775878"
      },
      {
        "category": "external",
        "summary": "1776010",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776010"
      },
      {
        "category": "external",
        "summary": "1776043",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776043"
      },
      {
        "category": "external",
        "summary": "1776060",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776060"
      },
      {
        "category": "external",
        "summary": "1776135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776135"
      },
      {
        "category": "external",
        "summary": "1776189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776189"
      },
      {
        "category": "external",
        "summary": "1776193",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776193"
      },
      {
        "category": "external",
        "summary": "1776213",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776213"
      },
      {
        "category": "external",
        "summary": "1776295",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776295"
      },
      {
        "category": "external",
        "summary": "1776297",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776297"
      },
      {
        "category": "external",
        "summary": "1776305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776305"
      },
      {
        "category": "external",
        "summary": "1776311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776311"
      },
      {
        "category": "external",
        "summary": "1776339",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776339"
      },
      {
        "category": "external",
        "summary": "1776401",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776401"
      },
      {
        "category": "external",
        "summary": "1776421",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776421"
      },
      {
        "category": "external",
        "summary": "1776474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776474"
      },
      {
        "category": "external",
        "summary": "1776486",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776486"
      },
      {
        "category": "external",
        "summary": "1776493",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776493"
      },
      {
        "category": "external",
        "summary": "1776521",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776521"
      },
      {
        "category": "external",
        "summary": "1776533",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776533"
      },
      {
        "category": "external",
        "summary": "1776604",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776604"
      },
      {
        "category": "external",
        "summary": "1776660",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776660"
      },
      {
        "category": "external",
        "summary": "1776698",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776698"
      },
      {
        "category": "external",
        "summary": "1776700",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776700"
      },
      {
        "category": "external",
        "summary": "1776708",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776708"
      },
      {
        "category": "external",
        "summary": "1776759",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776759"
      },
      {
        "category": "external",
        "summary": "1776768",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776768"
      },
      {
        "category": "external",
        "summary": "1776773",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776773"
      },
      {
        "category": "external",
        "summary": "1776797",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776797"
      },
      {
        "category": "external",
        "summary": "1776812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776812"
      },
      {
        "category": "external",
        "summary": "1776867",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776867"
      },
      {
        "category": "external",
        "summary": "1776885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776885"
      },
      {
        "category": "external",
        "summary": "1776897",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776897"
      },
      {
        "category": "external",
        "summary": "1776914",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776914"
      },
      {
        "category": "external",
        "summary": "1776935",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776935"
      },
      {
        "category": "external",
        "summary": "1776990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1776990"
      },
      {
        "category": "external",
        "summary": "1777036",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777036"
      },
      {
        "category": "external",
        "summary": "1777178",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777178"
      },
      {
        "category": "external",
        "summary": "1777205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777205"
      },
      {
        "category": "external",
        "summary": "1777229",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777229"
      },
      {
        "category": "external",
        "summary": "1777233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777233"
      },
      {
        "category": "external",
        "summary": "1777273",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777273"
      },
      {
        "category": "external",
        "summary": "1777281",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777281"
      },
      {
        "category": "external",
        "summary": "1777291",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777291"
      },
      {
        "category": "external",
        "summary": "1777388",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777388"
      },
      {
        "category": "external",
        "summary": "1777424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777424"
      },
      {
        "category": "external",
        "summary": "1777477",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777477"
      },
      {
        "category": "external",
        "summary": "1777513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777513"
      },
      {
        "category": "external",
        "summary": "1777517",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777517"
      },
      {
        "category": "external",
        "summary": "1777593",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777593"
      },
      {
        "category": "external",
        "summary": "1777732",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777732"
      },
      {
        "category": "external",
        "summary": "1777753",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777753"
      },
      {
        "category": "external",
        "summary": "1777776",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777776"
      },
      {
        "category": "external",
        "summary": "1777838",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777838"
      },
      {
        "category": "external",
        "summary": "1777970",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777970"
      },
      {
        "category": "external",
        "summary": "1778017",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778017"
      },
      {
        "category": "external",
        "summary": "1778205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778205"
      },
      {
        "category": "external",
        "summary": "1778213",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778213"
      },
      {
        "category": "external",
        "summary": "1778312",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778312"
      },
      {
        "category": "external",
        "summary": "1778535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778535"
      },
      {
        "category": "external",
        "summary": "1778686",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778686"
      },
      {
        "category": "external",
        "summary": "1778894",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778894"
      },
      {
        "category": "external",
        "summary": "1778904",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778904"
      },
      {
        "category": "external",
        "summary": "1778930",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778930"
      },
      {
        "category": "external",
        "summary": "1778940",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778940"
      },
      {
        "category": "external",
        "summary": "1778954",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778954"
      },
      {
        "category": "external",
        "summary": "1779101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779101"
      },
      {
        "category": "external",
        "summary": "1779189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779189"
      },
      {
        "category": "external",
        "summary": "1779191",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779191"
      },
      {
        "category": "external",
        "summary": "1779195",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779195"
      },
      {
        "category": "external",
        "summary": "1779222",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779222"
      },
      {
        "category": "external",
        "summary": "1779237",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779237"
      },
      {
        "category": "external",
        "summary": "1779316",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779316"
      },
      {
        "category": "external",
        "summary": "1779322",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779322"
      },
      {
        "category": "external",
        "summary": "1779329",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779329"
      },
      {
        "category": "external",
        "summary": "1779332",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779332"
      },
      {
        "category": "external",
        "summary": "1779348",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779348"
      },
      {
        "category": "external",
        "summary": "1779383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779383"
      },
      {
        "category": "external",
        "summary": "1779487",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779487"
      },
      {
        "category": "external",
        "summary": "1779491",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779491"
      },
      {
        "category": "external",
        "summary": "1779492",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779492"
      },
      {
        "category": "external",
        "summary": "1779524",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779524"
      },
      {
        "category": "external",
        "summary": "1779535",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779535"
      },
      {
        "category": "external",
        "summary": "1779665",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779665"
      },
      {
        "category": "external",
        "summary": "1779679",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779679"
      },
      {
        "category": "external",
        "summary": "1779681",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779681"
      },
      {
        "category": "external",
        "summary": "1779741",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779741"
      },
      {
        "category": "external",
        "summary": "1779791",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779791"
      },
      {
        "category": "external",
        "summary": "1779831",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779831"
      },
      {
        "category": "external",
        "summary": "1779913",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779913"
      },
      {
        "category": "external",
        "summary": "1779915",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779915"
      },
      {
        "category": "external",
        "summary": "1779916",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779916"
      },
      {
        "category": "external",
        "summary": "1779956",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779956"
      },
      {
        "category": "external",
        "summary": "1779995",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779995"
      },
      {
        "category": "external",
        "summary": "1780142",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780142"
      },
      {
        "category": "external",
        "summary": "1780379",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780379"
      },
      {
        "category": "external",
        "summary": "1780384",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780384"
      },
      {
        "category": "external",
        "summary": "1780408",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780408"
      },
      {
        "category": "external",
        "summary": "1780509",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780509"
      },
      {
        "category": "external",
        "summary": "1780587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780587"
      },
      {
        "category": "external",
        "summary": "1780590",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780590"
      },
      {
        "category": "external",
        "summary": "1780736",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780736"
      },
      {
        "category": "external",
        "summary": "1780738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780738"
      },
      {
        "category": "external",
        "summary": "1780835",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780835"
      },
      {
        "category": "external",
        "summary": "1780843",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780843"
      },
      {
        "category": "external",
        "summary": "1780953",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780953"
      },
      {
        "category": "external",
        "summary": "1780982",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780982"
      },
      {
        "category": "external",
        "summary": "1780989",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780989"
      },
      {
        "category": "external",
        "summary": "1780994",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780994"
      },
      {
        "category": "external",
        "summary": "1781019",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781019"
      },
      {
        "category": "external",
        "summary": "1781037",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781037"
      },
      {
        "category": "external",
        "summary": "1781053",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781053"
      },
      {
        "category": "external",
        "summary": "1781083",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781083"
      },
      {
        "category": "external",
        "summary": "1781104",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781104"
      },
      {
        "category": "external",
        "summary": "1781105",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781105"
      },
      {
        "category": "external",
        "summary": "1781141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781141"
      },
      {
        "category": "external",
        "summary": "1781178",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781178"
      },
      {
        "category": "external",
        "summary": "1781193",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781193"
      },
      {
        "category": "external",
        "summary": "1781258",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781258"
      },
      {
        "category": "external",
        "summary": "1781284",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781284"
      },
      {
        "category": "external",
        "summary": "1781286",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781286"
      },
      {
        "category": "external",
        "summary": "1781290",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781290"
      },
      {
        "category": "external",
        "summary": "1781313",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781313"
      },
      {
        "category": "external",
        "summary": "1781330",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781330"
      },
      {
        "category": "external",
        "summary": "1781347",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781347"
      },
      {
        "category": "external",
        "summary": "1781558",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781558"
      },
      {
        "category": "external",
        "summary": "1781577",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781577"
      },
      {
        "category": "external",
        "summary": "1781678",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781678"
      },
      {
        "category": "external",
        "summary": "1781763",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781763"
      },
      {
        "category": "external",
        "summary": "1781795",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781795"
      },
      {
        "category": "external",
        "summary": "1781798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781798"
      },
      {
        "category": "external",
        "summary": "1781843",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781843"
      },
      {
        "category": "external",
        "summary": "1781869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781869"
      },
      {
        "category": "external",
        "summary": "1781950",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781950"
      },
      {
        "category": "external",
        "summary": "1782104",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782104"
      },
      {
        "category": "external",
        "summary": "1782119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782119"
      },
      {
        "category": "external",
        "summary": "1782124",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782124"
      },
      {
        "category": "external",
        "summary": "1782147",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782147"
      },
      {
        "category": "external",
        "summary": "1782149",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782149"
      },
      {
        "category": "external",
        "summary": "1782164",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782164"
      },
      {
        "category": "external",
        "summary": "1782176",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782176"
      },
      {
        "category": "external",
        "summary": "1782204",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782204"
      },
      {
        "category": "external",
        "summary": "1782224",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782224"
      },
      {
        "category": "external",
        "summary": "1782237",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782237"
      },
      {
        "category": "external",
        "summary": "1782312",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782312"
      },
      {
        "category": "external",
        "summary": "1782409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782409"
      },
      {
        "category": "external",
        "summary": "1782447",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782447"
      },
      {
        "category": "external",
        "summary": "1782546",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782546"
      },
      {
        "category": "external",
        "summary": "1782584",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782584"
      },
      {
        "category": "external",
        "summary": "1782728",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782728"
      },
      {
        "category": "external",
        "summary": "1782795",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782795"
      },
      {
        "category": "external",
        "summary": "1782817",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782817"
      },
      {
        "category": "external",
        "summary": "1782819",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782819"
      },
      {
        "category": "external",
        "summary": "1782829",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782829"
      },
      {
        "category": "external",
        "summary": "1782837",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782837"
      },
      {
        "category": "external",
        "summary": "1782860",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782860"
      },
      {
        "category": "external",
        "summary": "1782992",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782992"
      },
      {
        "category": "external",
        "summary": "1782997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782997"
      },
      {
        "category": "external",
        "summary": "1783009",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783009"
      },
      {
        "category": "external",
        "summary": "1783010",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783010"
      },
      {
        "category": "external",
        "summary": "1783011",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783011"
      },
      {
        "category": "external",
        "summary": "1783259",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783259"
      },
      {
        "category": "external",
        "summary": "1783353",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783353"
      },
      {
        "category": "external",
        "summary": "1783448",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783448"
      },
      {
        "category": "external",
        "summary": "1783587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783587"
      },
      {
        "category": "external",
        "summary": "1783732",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783732"
      },
      {
        "category": "external",
        "summary": "1783829",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783829"
      },
      {
        "category": "external",
        "summary": "1783846",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783846"
      },
      {
        "category": "external",
        "summary": "1783892",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783892"
      },
      {
        "category": "external",
        "summary": "1783974",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783974"
      },
      {
        "category": "external",
        "summary": "1784082",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784082"
      },
      {
        "category": "external",
        "summary": "1784086",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784086"
      },
      {
        "category": "external",
        "summary": "1784166",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784166"
      },
      {
        "category": "external",
        "summary": "1784319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784319"
      },
      {
        "category": "external",
        "summary": "1784440",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784440"
      },
      {
        "category": "external",
        "summary": "1784469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784469"
      },
      {
        "category": "external",
        "summary": "1784475",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784475"
      },
      {
        "category": "external",
        "summary": "1784500",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784500"
      },
      {
        "category": "external",
        "summary": "1784629",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784629"
      },
      {
        "category": "external",
        "summary": "1784880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784880"
      },
      {
        "category": "external",
        "summary": "1784915",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784915"
      },
      {
        "category": "external",
        "summary": "1784981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784981"
      },
      {
        "category": "external",
        "summary": "1785138",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785138"
      },
      {
        "category": "external",
        "summary": "1785310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785310"
      },
      {
        "category": "external",
        "summary": "1785419",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785419"
      },
      {
        "category": "external",
        "summary": "1785675",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785675"
      },
      {
        "category": "external",
        "summary": "1786141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786141"
      },
      {
        "category": "external",
        "summary": "1786300",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786300"
      },
      {
        "category": "external",
        "summary": "1786993",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786993"
      },
      {
        "category": "external",
        "summary": "1787334",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787334"
      },
      {
        "category": "external",
        "summary": "1787587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787587"
      },
      {
        "category": "external",
        "summary": "1788054",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788054"
      },
      {
        "category": "external",
        "summary": "1788118",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788118"
      },
      {
        "category": "external",
        "summary": "1788321",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788321"
      },
      {
        "category": "external",
        "summary": "1788442",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788442"
      },
      {
        "category": "external",
        "summary": "1788580",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788580"
      },
      {
        "category": "external",
        "summary": "1788621",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788621"
      },
      {
        "category": "external",
        "summary": "1788704",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788704"
      },
      {
        "category": "external",
        "summary": "1789001",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789001"
      },
      {
        "category": "external",
        "summary": "1789014",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789014"
      },
      {
        "category": "external",
        "summary": "1789601",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789601"
      },
      {
        "category": "external",
        "summary": "1790329",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790329"
      },
      {
        "category": "external",
        "summary": "1791332",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791332"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhba-2020_0062.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3 image release advisory",
    "tracking": {
      "current_release_date": "2024-11-22T13:45:37+00:00",
      "generator": {
        "date": "2024-11-22T13:45:37+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHBA-2020:0062",
      "initial_release_date": "2020-01-23T11:03:26+00:00",
      "revision_history": [
        {
          "date": "2020-01-23T11:03:26+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-01-23T11:03:26+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T13:45:37+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.3",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.3",
                  "product_id": "7Server-RH7-RHOSE-4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.3::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.3",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.3",
                  "product_id": "8Base-RHOSE-4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.3::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
                  "product_id": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
                  "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
                  "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
                  "product_id": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
                  "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
                  "product_id": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
                "product": {
                  "name": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
                  "product_id": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
                "product": {
                  "name": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
                  "product_id": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
                "product": {
                  "name": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
                  "product_id": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
                  "product_id": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
                  "product_id": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
                  "product_id": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
                "product": {
                  "name": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
                  "product_id": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
                  "product_id": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
                  "product_id": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-hardware-inventory-recorder-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
                  "product_id": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-inspector-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
                  "product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
                  "product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-machine-os-downloader-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
                  "product_id": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-static-ip-manager-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
                  "product_id": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
                "product": {
                  "name": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
                  "product_id": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
                "product": {
                  "name": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
                  "product_id": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
                "product": {
                  "name": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
                  "product_id": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
                "product": {
                  "name": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
                  "product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64",
                "product": {
                  "name": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64",
                  "product_id": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-controller-rhel8\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
                "product": {
                  "name": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
                  "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
                "product": {
                  "name": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
                  "product_id": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
                "product": {
                  "name": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
                  "product_id": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
                "product": {
                  "name": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
                  "product_id": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
                "product": {
                  "name": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
                  "product_id": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
                "product": {
                  "name": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
                  "product_id": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
                "product": {
                  "name": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
                  "product_id": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
                "product": {
                  "name": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
                  "product_id": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
                "product": {
                  "name": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
                  "product_id": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
                "product": {
                  "name": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
                  "product_id": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
                "product": {
                  "name": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
                  "product_id": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
                "product": {
                  "name": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
                  "product_id": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
                "product": {
                  "name": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
                  "product_id": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
                "product": {
                  "name": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
                  "product_id": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
                  "product_id": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
                "product": {
                  "name": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
                  "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
                "product": {
                  "name": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
                  "product_id": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
                "product": {
                  "name": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
                  "product_id": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
                "product": {
                  "name": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
                  "product_id": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
                "product": {
                  "name": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
                  "product_id": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
                "product": {
                  "name": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
                  "product_id": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
                  "product_id": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
                  "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
                  "product_id": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
                  "product_id": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
                  "product_id": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
                  "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
                  "product_id": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
                  "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
                  "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
                  "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
                  "product_id": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
                  "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
                  "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
                  "product_id": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
                  "product_id": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
                  "product_id": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
                "product": {
                  "name": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
                  "product_id": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
                "product": {
                  "name": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
                  "product_id": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
                "product": {
                  "name": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
                  "product_id": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
                "product": {
                  "name": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
                  "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
                "product": {
                  "name": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
                  "product_id": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
                "product": {
                  "name": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
                  "product_id": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
                "product": {
                  "name": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
                  "product_id": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
                "product": {
                  "name": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
                  "product_id": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
                  "product_id": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel7\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
                  "product_id": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel7\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
                "product": {
                  "name": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
                  "product_id": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
                "product": {
                  "name": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
                  "product_id": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
                "product": {
                  "name": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
                  "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
                "product": {
                  "name": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
                  "product_id": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
                  "product_id": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
                  "product_id": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
                "product": {
                  "name": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
                  "product_id": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.3.0-202001211731"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
                "product": {
                  "name": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
                  "product_id": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.3.0-202001211731"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64"
        },
        "product_reference": "openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64"
        },
        "product_reference": "openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64"
        },
        "product_reference": "openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64"
        },
        "product_reference": "openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64"
        },
        "product_reference": "openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64"
        },
        "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64"
        },
        "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64"
        },
        "product_reference": "openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64"
        },
        "product_reference": "openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64"
        },
        "product_reference": "openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64"
        },
        "product_reference": "openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64"
        },
        "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64"
        },
        "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64"
        },
        "product_reference": "openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64"
        },
        "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64"
        },
        "product_reference": "openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64"
        },
        "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64"
        },
        "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64"
        },
        "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64"
        },
        "product_reference": "openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64"
        },
        "product_reference": "openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64"
        },
        "product_reference": "openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64"
        },
        "product_reference": "openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64"
        },
        "product_reference": "openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64"
        },
        "product_reference": "openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64"
        },
        "product_reference": "openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64"
        },
        "product_reference": "openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64"
        },
        "product_reference": "openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64"
        },
        "product_reference": "openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64"
        },
        "product_reference": "openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64"
        },
        "product_reference": "openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64"
        },
        "product_reference": "openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64"
        },
        "product_reference": "openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64"
        },
        "product_reference": "openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64"
        },
        "product_reference": "openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64"
        },
        "product_reference": "openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64"
        },
        "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64"
        },
        "product_reference": "openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64"
        },
        "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64"
        },
        "product_reference": "openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64"
        },
        "product_reference": "openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64"
        },
        "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64"
        },
        "product_reference": "openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64"
        },
        "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64"
        },
        "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64"
        },
        "product_reference": "openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64"
        },
        "product_reference": "openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64"
        },
        "product_reference": "openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64"
        },
        "product_reference": "openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64"
        },
        "product_reference": "openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64"
        },
        "product_reference": "openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64"
        },
        "product_reference": "openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64"
        },
        "product_reference": "openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64"
        },
        "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64"
        },
        "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64"
        },
        "product_reference": "openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64"
        },
        "product_reference": "openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64"
        },
        "product_reference": "openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64"
        },
        "product_reference": "openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64"
        },
        "product_reference": "openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64"
        },
        "product_reference": "openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64"
        },
        "product_reference": "openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64"
        },
        "product_reference": "openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64"
        },
        "product_reference": "openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64"
        },
        "product_reference": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64"
        },
        "product_reference": "openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64"
        },
        "product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64"
        },
        "product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64"
        },
        "product_reference": "openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64"
        },
        "product_reference": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64"
        },
        "product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64 as a component of Red Hat OpenShift Container Platform 4.3",
          "product_id": "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
        },
        "product_reference": "openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-11840",
      "cwe": {
        "id": "CWE-330",
        "name": "Use of Insufficiently Random Values"
      },
      "discovery_date": "2019-03-21T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1691529"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages. If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang.org/x/crypto: Keystream loop in amd64 assembly when overflowing 32-bit counter",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64"
        ],
        "known_not_affected": [
          "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-11840"
        },
        {
          "category": "external",
          "summary": "RHBZ#1691529",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691529"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11840",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-11840"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11840",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11840"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/tjyNcJxb2vQ/n0NRBziSCAAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/tjyNcJxb2vQ/n0NRBziSCAAJ"
        }
      ],
      "release_date": "2019-03-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-01-23T11:03:26+00:00",
          "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.",
          "product_ids": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2020:0062"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang.org/x/crypto: Keystream loop in amd64 assembly when overflowing 32-bit counter"
    },
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64"
        ],
        "known_not_affected": [
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cli-artifacts@sha256:21bef813eb3f7a4e9363c736ab802f47c7ab1a477bbc5127d06a3b4c32357c79_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cli@sha256:284d01ca7e20fab2f576fa3a011047dbd80e880d62ba86963b4131e9b1b45761_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-authentication-operator@sha256:a0b38882cb779a3f9ea1cbd333abb66812685f1649945226ea7dcae28dce54c9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-dns-operator@sha256:c7ae77c9fa112a2b538e8ce1659243147c77ebb8d6bdc200f69d58daf7a77a09_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-image-registry-operator@sha256:ffa87c992c5a2c51290e6d67cb609f29893dd147c31cff639ff6785ae7a1cfe2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-ingress-operator@sha256:9107a722c76c8c8932c2a28bd4d900ece7a817be26ebd940ae9e8d7607201f01_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-apiserver-operator@sha256:82da92bbb613ac348132603aa0b39a10978fb2f5c89954455b8777d3b68da944_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-controller-manager-operator@sha256:b76f8f4582d98133993414af5208d0a271f635542f7c553f1f3b49404d3efbb5_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-kube-scheduler-operator@sha256:31f0ce692cd5609e07271fd64c592255083ca4d09c78b46c3704e3d69545789d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-apiserver-operator@sha256:00ec58112784d340179e045bc70399ac1bd509ae43c4411e934ced23d016b2a1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:8123e4286ee4ff5935c09efc2472a8d3ca35ce51e7e0f0f54ea2058cae6221d8_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-update-keys@sha256:41db23a308387f34c1cc98bf5170843df3e5dab7768e5c47c0593d8ed085a1ae_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-version-operator@sha256:18006bbb619155222bfbc1d5af372b80dff8a22b386d8096b88434e99fd97ef3_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-console-operator@sha256:d6402c443c7c3469f3637f9e58366fea780e4d2464a0b1bcfea3c2d18167ae7a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-coredns@sha256:284195c16a37e10749452904ea6013010e7967e2a3c4b58e7b94665b58f22a7e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-deployer@sha256:dd06a8ddfda407007ce348b59424b36a1a43c17bf48102219775e902daad7037_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-haproxy-router@sha256:87c6ad4e9b3111fcd96eaba4857ab3bbed53d8cfda37c86be76ad61e2db4d5f2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-hyperkube@sha256:e656289cf230d0a9ab678b14fe6890f7e3101ee7b2daf0ab24363240ec6cb1c1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-installer-artifacts@sha256:2fc5146ce48ad7edb3cd162519483a0368ed7614a8544a9c474968900ca2b237_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-installer@sha256:537bedac3c10eed6f54ec061c2f4f52af0b2eb139b89519326fa6bcd28230756_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins-agent-maven@sha256:350cf998a4b63eb3233cd6104117c9ff1a389798eeaf9318a4fbd0788cfcb136_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-jenkins@sha256:dd5f1c5d14a8a72aa4ca51224c26a661c2e4f19ea3e5f9b7d8343f4952de5f0d_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-keepalived-ipfailover@sha256:a60f50e4e62d5908ed9f6f5e58b9e0fb6b0279c77eaa911db309caee1b54eca3_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-proxy@sha256:71a2fdcd1789e4e9451e19b5812d79d1f12a16a61cc6eb790e30993b304bd555_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-oauth-proxy@sha256:13d5837cbf874b3d1a79254456f0a9a67af1f2872b79177b51e3c205a753dce9_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-apiserver-rhel7@sha256:248d2d3c94484a907bcf123d371f5349034802be877fc0cdab5391acf87da979_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-openshift-controller-manager-rhel7@sha256:d9b786c5fdf4a9a8ea56fa4d289b049722f19dae06388969178fda2cb02a9462_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-lifecycle-manager@sha256:dbde7140eb5c05e05252e2bc2891f47761aecf465803d08831c6b20c84bebbb8_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-registry@sha256:77d73250630dbcdb0126c966f48629f25e86b770d1c8dcf00e8ceb1f11aac9b2_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-alertmanager@sha256:db925a8ed36a1b705d7a88aefc59e96f92efa95277383c510ac1630f881d3f0c_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-node-exporter@sha256:26af77641bd7a6c6daa4669309250e5e98f8a44b6f1562367003f7bdbcfb77f1_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-operator@sha256:23b72d638653fa51dc8a2c0c4d46b092be75544a6a11143aaaa563804ff9550e_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus@sha256:91b840bbf21b792e0d749e1b29b42d05c4e93c422184defd0cea7d79c308846a_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-service-ca-operator@sha256:f57ee886aa449aaeff6e49909d53746c2785bd7ab6b451d6cce0912684c33efe_amd64",
          "7Server-RH7-RHOSE-4.3:openshift4/ose-tests@sha256:9718d5e50e6941a5ce281575372c89c95d90f479e6776d9287dd028365967355_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-hardware-inventory-recorder-rhel8@sha256:794ffe21a7b408feed6c6616ff8a1cbe8710ea41f46f66d156d997ff042d5e87_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-inspector-rhel8@sha256:4222c6a327cad220e46861c9a4b7ea500f037cb5f2348f59dbebde1b73e51ce7_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:9dab031f2f79c1f602c635b76ffd49f36d812e1d2375572de792cbd11417f1f9_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:796fc08bdfdb88cca8efec6c5fa0020ae0a48e73df43830cf28e014451524e58_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-rhel8@sha256:af700a1cb45374574f965bd228be3547752e3cd5858f92b008fced3382d7058a_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:4e7428bb69d67db1a8764b5cda39904ff28e9639199ef5728d1ec1e4dc9d495e_amd64",
          "8Base-RHOSE-4.3:openshift4/ose-kuryr-controller-rhel8@sha256:84ce2c1480399488f846f8644532ecd08e4c048c81a65a994fa92b4fc3030896_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-01-23T11:03:26+00:00",
          "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.",
          "product_ids": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2020:0062"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-4.3:openshift4/ose-aws-machine-controllers@sha256:96ad50c0bafdd4fdbfe48f4bf69c8ca20bba81c0fa857f8d37d550da2219148c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-azure-machine-controllers@sha256:d3c862dc76efe82edb9a29db423fd12cda3af34b131e4bcd0890e129e371cb12_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-baremetal-machine-controllers@sha256:d3069db2b26c1b66161e700ab8b50f2dd3a6d9eb7e8a2d29edad4eaabe40a6c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cloud-credential-operator@sha256:1773268ac4f1ed0c9f27ac94fbc68a7ed56d1f745de4e649789dbb66c325d94a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler-operator@sha256:702706ac38dfdd0baacaa858d40e0bb58e0c612fa58167a998f55882e7d9538c_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-autoscaler@sha256:59ae5a79f7579b59c6dfeab4ee21488d9d1de2eb501fb3ad83f76f05a3a1e1c1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-bootstrap@sha256:8dcda0b330bb56e505e096169860d32081f85735aa241daba41b56f9b54032a4_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-config-operator@sha256:e232e3e7c6902f749e4264229c67947fa5cfc248e7bf66db380d6333ba377238_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-machine-approver@sha256:a214477ad7e55c68226dec45a6c7d7e621d9df790151db98f7607ceb1a33e801_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-monitoring-operator@sha256:f0a89689401f1d836ef12e7a9d5119549026cdb28c71c0c96f3e947c957fe07d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-network-operator@sha256:14e59b09da6a818014ec9f6e0ed83fbfbb3d90f46097c1e66ef80594f0511b19_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-node-tuning-operator@sha256:8807e4b17886bf320c791b4a131607e515635cb26fe01fe9e7ed1718a0340dc0_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-samples-operator@sha256:73264887ad31031da31a193f5f6fe4499235ea2ae113c4cca315f34671bb92a7_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-cluster-storage-operator@sha256:4507c95b842563b29ca3e45d4c80856855bb24823ef618e15ecb6854a3afe431_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-configmap-reloader@sha256:31938e349d61db5146e6387b05f5af2bd8f3aa822f93d2d3546c5a4369d35186_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-console@sha256:d6d433be9348624aa729410cc76bd7a9d5f71c2ec27c49aafbabbab18be0f16b_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-builder@sha256:5b4d7ccfae31e068acba8065848d9c4ff206c0b4cf25e7792946a8752565a417_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-docker-registry@sha256:22aeef6864c2b168ba363866aa799a7949898976b4f89f50b4899ee9bf1fd86e_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-etcd@sha256:7c6de86b5f3140fa33a69477c286afc901b4ecd6e73e82d0ccfc8a0e0fe5e648_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-grafana@sha256:af15dc66cdc248eed3988ab49adc684dc85ce5429c855b1933fc8fb13296d61a_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-k8s-prometheus-adapter@sha256:72b7df02f2f67c278036224111179c59b40342ce53d21be4c8d988af24c2f228_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-rbac-proxy@sha256:d7b1c8f2c94af9c767ab0f60f23f8fb5b7545fdfd7c10b1ef979b7701e495f36_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-kube-state-metrics@sha256:fa07d12df9c1ba0f40d5f799207ccab2404518e578a912dec7833bde06ce17fa_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-libvirt-machine-controllers@sha256:58debef6496409ad07469140a6a62366aebd448c09e2b0e606b5747b56150c66_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-local-storage-static-provisioner@sha256:ed74a10b8ab286e656ddc69711d2e02d4f7bc661864bf306fb306a73c159e9fb_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-api-operator@sha256:6f8916d4aa74f8b9a2d7d26b79be9ca6949dbb56b86bfbb6dd2f34d67bff9aa1_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-machine-config-operator@sha256:328fe29aa1114807b2b4462488650a23a7dde77f63af0f45e6a2ccaabfb56850_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-admission-controller@sha256:bbc0e9fbb5923f7019304a5b34fd653300f54fc9732c520bac8fa5390bf5dab5_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-multus-cni@sha256:7ca9f9543092ee337bc2d7461451a18d707f78b89d1ca924cee9ba5e7f9dc75f_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-must-gather@sha256:fa97dba5c09052c95c1f6471eb6a917cf18028368b2ce66dd95907aaa7bda4ac_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-openstack-machine-controllers@sha256:9552704d9b1994f399dd709b34b953ea99665cddebc5e8e99cea8b459f6534ed_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-operator-marketplace@sha256:811346fb6951c166b2ee96c09feb173e50ec48167476bb2d4fcc4303f8ae7ecd_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-ovn-kubernetes@sha256:7d6ba1bcc4f403733e44cd2a008dafe1887501f7a3c74084566a4f4d1e46250d_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-pod@sha256:2dc3bdcb2b0bf1d6c6ae749be0163e6d7ca813ecfba5e5f5d88970c73a9d12a9_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prom-label-proxy@sha256:6ed57940ac48d1e8ee12c28dc01132cc2c7c4926954096bcb7abc24776c24398_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-prometheus-config-reloader@sha256:b99eb84b4ae632da7f994a25deed84d299ba358ffca09d93c02b78fdfe259578_amd64",
            "7Server-RH7-RHOSE-4.3:openshift4/ose-telemeter@sha256:b49995a2e256dd8ff1463f605dc81f21bdd3795797b12d635513de0b214ada15_amd64",
            "8Base-RHOSE-4.3:openshift4/ose-kuryr-cni-rhel8@sha256:3bdf92c405607240de040e15023cd5ab2640fc31a4ed9750e41765fa0cf4d758_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    }
  ]
}
  rhba-2019_3303
Vulnerability from csaf_redhat
Published
2019-11-13 18:55
    Modified
2024-11-13 22:06
    Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 images update
    Notes
Topic
Red Hat OpenShift Container Platform release 4.2.4 is now available with
updates to packages and images that fix several bugs.
    Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat
4OpenShift Container Platform 4.2.4. See the following advisory for the
RPM packages for this release:
https://access.redhat.com/errata/RHBA-2019:3304
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-rel
ease-notes.html
You may download the oc tool and use it to inspect release image metadata
as follows:
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.2.4
The image digest is
sha256:e8ed03f1fb2ef07c15ec4c8ce1bc29962225f32572e9d36c81cf110c1bff9268
All OpenShift Container Platform 4.2 users are advised to upgrade to these
updated packages and images.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat OpenShift Container Platform release 4.2.4 is now available with\nupdates to packages and images that fix several bugs.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat\n4OpenShift Container Platform 4.2.4. See the following advisory for the\nRPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:3304\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-rel\nease-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.2.4\n\nThe image digest is\nsha256:e8ed03f1fb2ef07c15ec4c8ce1bc29962225f32572e9d36c81cf110c1bff9268\n\nAll OpenShift Container Platform 4.2 users are advised to upgrade to these\nupdated packages and images.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2019:3303",
        "url": "https://access.redhat.com/errata/RHBA-2019:3303"
      },
      {
        "category": "external",
        "summary": "1755557",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755557"
      },
      {
        "category": "external",
        "summary": "1755780",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755780"
      },
      {
        "category": "external",
        "summary": "1756478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756478"
      },
      {
        "category": "external",
        "summary": "1757134",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757134"
      },
      {
        "category": "external",
        "summary": "1757234",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757234"
      },
      {
        "category": "external",
        "summary": "1757390",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757390"
      },
      {
        "category": "external",
        "summary": "1758373",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758373"
      },
      {
        "category": "external",
        "summary": "1759181",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759181"
      },
      {
        "category": "external",
        "summary": "1759400",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759400"
      },
      {
        "category": "external",
        "summary": "1759986",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759986"
      },
      {
        "category": "external",
        "summary": "1760044",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760044"
      },
      {
        "category": "external",
        "summary": "1760480",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760480"
      },
      {
        "category": "external",
        "summary": "1761507",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761507"
      },
      {
        "category": "external",
        "summary": "1761814",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761814"
      },
      {
        "category": "external",
        "summary": "1761879",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761879"
      },
      {
        "category": "external",
        "summary": "1761887",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761887"
      },
      {
        "category": "external",
        "summary": "1762409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762409"
      },
      {
        "category": "external",
        "summary": "1762960",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762960"
      },
      {
        "category": "external",
        "summary": "1763057",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763057"
      },
      {
        "category": "external",
        "summary": "1763205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763205"
      },
      {
        "category": "external",
        "summary": "1763279",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763279"
      },
      {
        "category": "external",
        "summary": "1763749",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763749"
      },
      {
        "category": "external",
        "summary": "1763822",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763822"
      },
      {
        "category": "external",
        "summary": "1763891",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763891"
      },
      {
        "category": "external",
        "summary": "1764227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764227"
      },
      {
        "category": "external",
        "summary": "1765308",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765308"
      },
      {
        "category": "external",
        "summary": "1767237",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767237"
      },
      {
        "category": "external",
        "summary": "1767943",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767943"
      },
      {
        "category": "external",
        "summary": "1767948",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767948"
      },
      {
        "category": "external",
        "summary": "1767951",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767951"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_3303.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 images update",
    "tracking": {
      "current_release_date": "2024-11-13T22:06:31+00:00",
      "generator": {
        "date": "2024-11-13T22:06:31+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHBA-2019:3303",
      "initial_release_date": "2019-11-13T18:55:26+00:00",
      "revision_history": [
        {
          "date": "2019-11-13T18:55:26+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-13T18:55:26+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-13T22:06:31+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "7Server-RH7-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "8Base-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
                  "product_id": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
                  "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
                  "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
                  "product_id": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.2.4-201911071400"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
                  "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
                  "product_id": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
                "product": {
                  "name": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
                  "product_id": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
                "product": {
                  "name": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
                  "product_id": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
                "product": {
                  "name": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
                  "product_id": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
                  "product_id": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
                  "product_id": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
                "product": {
                  "name": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
                  "product_id": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
                  "product_id": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
                  "product_id": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-inspector-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
                  "product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
                  "product_id": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhcos-downloader-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64",
                  "product_id": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-static-ip-manager-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
                  "product_id": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.2.4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
                  "product_id": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
                "product": {
                  "name": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
                  "product_id": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
                "product": {
                  "name": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
                  "product_id": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
                "product": {
                  "name": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
                  "product_id": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
                "product": {
                  "name": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
                  "product_id": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
                "product": {
                  "name": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
                  "product_id": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-controller-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
                "product": {
                  "name": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
                  "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
                "product": {
                  "name": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
                  "product_id": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
                "product": {
                  "name": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
                  "product_id": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
                "product": {
                  "name": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
                  "product_id": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
                "product": {
                  "name": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
                  "product_id": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
                "product": {
                  "name": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
                  "product_id": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
                "product": {
                  "name": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
                  "product_id": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
                "product": {
                  "name": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
                  "product_id": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
                "product": {
                  "name": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
                  "product_id": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
                "product": {
                  "name": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
                  "product_id": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
                "product": {
                  "name": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
                  "product_id": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
                "product": {
                  "name": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
                  "product_id": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
                "product": {
                  "name": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
                  "product_id": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
                "product": {
                  "name": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
                  "product_id": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-catalog\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
                "product": {
                  "name": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
                  "product_id": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.2.4-201911072324"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
                  "product_id": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
                  "product_id": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
                "product": {
                  "name": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
                  "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
                "product": {
                  "name": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
                  "product_id": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
                "product": {
                  "name": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
                  "product_id": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
                "product": {
                  "name": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
                  "product_id": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
                  "product_id": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel7\u0026tag=v4.2.4-201911071400"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
                  "product_id": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel7-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
                  "product_id": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
                "product": {
                  "name": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
                  "product_id": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
                "product": {
                  "name": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
                  "product_id": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
                  "product_id": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
                  "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
                  "product_id": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
                  "product_id": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
                  "product_id": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
                  "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
                  "product_id": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
                  "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
                  "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
                  "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
                  "product_id": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
                  "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
                  "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
                  "product_id": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
                  "product_id": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
                  "product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
                  "product_id": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-controller-manager-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
                  "product_id": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
                "product": {
                  "name": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
                  "product_id": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
                "product": {
                  "name": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
                  "product_id": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
                "product": {
                  "name": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
                  "product_id": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-machine-controllers-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
                "product": {
                  "name": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
                  "product_id": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel7-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
                "product": {
                  "name": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
                  "product_id": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.2.4-201911071400"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
                "product": {
                  "name": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
                  "product_id": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.2.4-201911071400"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
                "product": {
                  "name": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
                  "product_id": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-client-agent\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
                "product": {
                  "name": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
                  "product_id": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-etcd-signer-server\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
                "product": {
                  "name": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
                  "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
                "product": {
                  "name": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
                  "product_id": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
                "product": {
                  "name": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
                  "product_id": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
                "product": {
                  "name": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
                  "product_id": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
                "product": {
                  "name": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
                  "product_id": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
                "product": {
                  "name": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
                  "product_id": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
                "product": {
                  "name": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
                  "product_id": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-controller-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
                "product": {
                  "name": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
                  "product_id": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
                  "product_id": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
                  "product_id": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
                "product": {
                  "name": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
                  "product_id": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
                "product": {
                  "name": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
                  "product_id": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
                "product": {
                  "name": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
                  "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
                "product": {
                  "name": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
                  "product_id": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
                  "product_id": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
                  "product_id": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
                "product": {
                  "name": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
                  "product_id": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
                "product": {
                  "name": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
                  "product_id": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
                  "product_id": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuned\u0026tag=v4.2.4-201911050122"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64"
        },
        "product_reference": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64"
        },
        "product_reference": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64"
        },
        "product_reference": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64"
        },
        "product_reference": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64"
        },
        "product_reference": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64"
        },
        "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64"
        },
        "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64"
        },
        "product_reference": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64"
        },
        "product_reference": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64"
        },
        "product_reference": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64"
        },
        "product_reference": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64"
        },
        "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64"
        },
        "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64"
        },
        "product_reference": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64"
        },
        "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64"
        },
        "product_reference": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64"
        },
        "product_reference": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64"
        },
        "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64"
        },
        "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64"
        },
        "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64"
        },
        "product_reference": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64"
        },
        "product_reference": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64"
        },
        "product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64"
        },
        "product_reference": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64"
        },
        "product_reference": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64"
        },
        "product_reference": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64"
        },
        "product_reference": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64"
        },
        "product_reference": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64"
        },
        "product_reference": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64"
        },
        "product_reference": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64"
        },
        "product_reference": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64"
        },
        "product_reference": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64"
        },
        "product_reference": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64"
        },
        "product_reference": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64"
        },
        "product_reference": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64"
        },
        "product_reference": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64"
        },
        "product_reference": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64"
        },
        "product_reference": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64"
        },
        "product_reference": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64"
        },
        "product_reference": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64"
        },
        "product_reference": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64"
        },
        "product_reference": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64"
        },
        "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64"
        },
        "product_reference": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64"
        },
        "product_reference": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64"
        },
        "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64"
        },
        "product_reference": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64"
        },
        "product_reference": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64"
        },
        "product_reference": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64"
        },
        "product_reference": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64"
        },
        "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64"
        },
        "product_reference": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64"
        },
        "product_reference": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64"
        },
        "product_reference": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64"
        },
        "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64"
        },
        "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64"
        },
        "product_reference": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64"
        },
        "product_reference": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64"
        },
        "product_reference": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64"
        },
        "product_reference": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64"
        },
        "product_reference": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64"
        },
        "product_reference": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64"
        },
        "product_reference": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64"
        },
        "product_reference": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64"
        },
        "product_reference": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64"
        },
        "product_reference": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64"
        },
        "product_reference": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64"
        },
        "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64"
        },
        "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64"
        },
        "product_reference": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64"
        },
        "product_reference": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64"
        },
        "product_reference": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64"
        },
        "product_reference": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64"
        },
        "product_reference": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64"
        },
        "product_reference": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64"
        },
        "product_reference": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64"
        },
        "product_reference": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64"
        },
        "product_reference": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64"
        },
        "product_reference": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64"
        },
        "product_reference": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64"
        },
        "product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64"
        },
        "product_reference": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64"
        },
        "product_reference": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64"
        },
        "product_reference": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64"
        ],
        "known_not_affected": [
          "7Server-RH7-RHOSE-4.2:openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-13T18:55:26+00:00",
          "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.4, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2019:3303"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    }
  ]
}
  rhsa-2020_0329
Vulnerability from csaf_redhat
Published
2020-02-04 13:21
    Modified
2024-11-13 22:11
    Summary
Red Hat Security Advisory: go-toolset:rhel8 security update
    Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)
* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)\n\n* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:0329",
        "url": "https://access.redhat.com/errata/RHSA-2020:0329"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1755969",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
      },
      {
        "category": "external",
        "summary": "1763310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763310"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0329.json"
      }
    ],
    "title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
    "tracking": {
      "current_release_date": "2024-11-13T22:11:03+00:00",
      "generator": {
        "date": "2024-11-13T22:11:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHSA-2020:0329",
      "initial_release_date": "2020-02-04T13:21:59+00:00",
      "revision_history": [
        {
          "date": "2020-02-04T13:21:59+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-02-04T13:21:59+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-13T22:11:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.1.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset:rhel8:8010020191220185136:0ed30617",
                "product": {
                  "name": "go-toolset:rhel8:8010020191220185136:0ed30617",
                  "product_id": "go-toolset:rhel8:8010020191220185136:0ed30617",
                  "product_identification_helper": {
                    "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-docs-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
                "product": {
                  "name": "golang-docs-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
                  "product_id": "golang-docs-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-docs@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-misc-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
                "product": {
                  "name": "golang-misc-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
                  "product_id": "golang-misc-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-misc@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-src-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
                "product": {
                  "name": "golang-src-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
                  "product_id": "golang-src-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-src@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-tests-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
                "product": {
                  "name": "golang-tests-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
                  "product_id": "golang-tests-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-tests@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.src",
                "product": {
                  "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.src",
                  "product_id": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.src",
                "product": {
                  "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.src",
                  "product_id": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64",
                "product": {
                  "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64",
                  "product_id": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
                "product": {
                  "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
                  "product_id": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
                "product": {
                  "name": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
                  "product_id": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-bin@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-race-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
                "product": {
                  "name": "golang-race-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
                  "product_id": "golang-race-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-race@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x",
                "product": {
                  "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x",
                  "product_id": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
                "product": {
                  "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
                  "product_id": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
                "product": {
                  "name": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
                  "product_id": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-bin@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le",
                "product": {
                  "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le",
                  "product_id": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
                "product": {
                  "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
                  "product_id": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
                "product": {
                  "name": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
                  "product_id": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-bin@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64",
                "product": {
                  "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64",
                  "product_id": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
                "product": {
                  "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
                  "product_id": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
                "product": {
                  "name": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
                  "product_id": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-bin@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
        },
        "product_reference": "go-toolset:rhel8:8010020191220185136:0ed30617",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64 as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64"
        },
        "product_reference": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le"
        },
        "product_reference": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x"
        },
        "product_reference": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.src as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.src"
        },
        "product_reference": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.src",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64 as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64"
        },
        "product_reference": "go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64 as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64"
        },
        "product_reference": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le"
        },
        "product_reference": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x"
        },
        "product_reference": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.src as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.src"
        },
        "product_reference": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.src",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64 as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64"
        },
        "product_reference": "golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64 as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64"
        },
        "product_reference": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le"
        },
        "product_reference": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x"
        },
        "product_reference": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64 as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64"
        },
        "product_reference": "golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-docs-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-docs-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch"
        },
        "product_reference": "golang-docs-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-misc-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-misc-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch"
        },
        "product_reference": "golang-misc-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-race-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64 as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-race-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64"
        },
        "product_reference": "golang-race-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-src-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-src-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch"
        },
        "product_reference": "golang-src-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-tests-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch as a component of go-toolset:rhel8:8010020191220185136:0ed30617 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-tests-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch"
        },
        "product_reference": "golang-tests-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.src",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.src",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-docs-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-misc-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-race-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-src-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-tests-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-02-04T13:21:59+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.src",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.src",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-docs-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-misc-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-race-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-src-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-tests-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0329"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.src",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.src",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-docs-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-misc-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-race-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-src-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-tests-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    },
    {
      "cve": "CVE-2019-17596",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "discovery_date": "2019-10-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1763310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: invalid public key causes panic in dsa.Verify",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.src",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.src",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-docs-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-misc-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-race-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-src-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-tests-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "RHBZ#1763310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17596",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17596",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ"
        }
      ],
      "release_date": "2019-10-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-02-04T13:21:59+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.src",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.src",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-docs-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-misc-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-race-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-src-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-tests-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0329"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.src",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:go-toolset-0:1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.src",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-bin-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-docs-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-misc-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-race-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-src-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset:rhel8:8010020191220185136:0ed30617:golang-tests-0:1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: invalid public key causes panic in dsa.Verify"
    }
  ]
}
  RHBA-2019:3304
Vulnerability from csaf_redhat
Published
2019-11-13 16:48
    Modified
2025-10-15 11:13
    Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 bug fix update
    Notes
Topic
Red Hat OpenShift Container Platform release 4.2.4 is now available with
updates to packages and images that fix several bugs.
    Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat
OpenShift Container Platform 4.2.4. See the following advisory for the
container images for this release:
https://access.redhat.com/errata/RHBA-2019:3303
All OpenShift Container Platform 4.2 users are advised to upgrade to these
updated packages and images.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat OpenShift Container Platform release 4.2.4 is now available with\nupdates to packages and images that fix several bugs.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat\nOpenShift Container Platform 4.2.4. See the following advisory for the\ncontainer images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:3303\n\nAll OpenShift Container Platform 4.2 users are advised to upgrade to these\nupdated packages and images.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2019:3304",
        "url": "https://access.redhat.com/errata/RHBA-2019:3304"
      },
      {
        "category": "external",
        "summary": "1765304",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765304"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_3304.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 bug fix update",
    "tracking": {
      "current_release_date": "2025-10-15T11:13:14+00:00",
      "generator": {
        "date": "2025-10-15T11:13:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHBA-2019:3304",
      "initial_release_date": "2019-11-13T16:48:38+00:00",
      "revision_history": [
        {
          "date": "2019-11-13T16:48:38+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-13T16:48:38+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-15T11:13:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "8Base-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "7Server-RH7-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition-validate@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition-debugsource@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition-debuginfo@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64",
                "product": {
                  "name": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64",
                  "product_id": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pivot@0.0.5-2.rhaos4.2.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                "product": {
                  "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                  "product_id": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-clients@4.2.4-201911010432.git.1.30c33a5.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                "product": {
                  "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                  "product_id": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.2.4-201911010432.git.1.30c33a5.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
                "product": {
                  "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
                  "product_id": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-hyperkube@4.2.4-201911041319.git.0.c7d2111.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
                "product": {
                  "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
                  "product_id": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@4.2.4-201911010432.git.1.0b5cd44.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                "product": {
                  "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                  "product_id": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-clients@4.2.4-201911010432.git.1.30c33a5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                "product": {
                  "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                  "product_id": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.2.4-201911010432.git.1.30c33a5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
                "product": {
                  "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
                  "product_id": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.2.4-201911041319.git.1.4131c2f.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                "product": {
                  "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                  "product_id": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.2.4-201911041319.git.1.1de4bcd.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                "product": {
                  "name": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                  "product_id": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.2.4-201911041319.git.1.1de4bcd.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
                "product": {
                  "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
                  "product_id": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-hyperkube@4.2.4-201911041319.git.0.c7d2111.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "faq-0:0.0.6-4.el7.x86_64",
                "product": {
                  "name": "faq-0:0.0.6-4.el7.x86_64",
                  "product_id": "faq-0:0.0.6-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/faq@0.0.6-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64",
                "product": {
                  "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64",
                  "product_id": "faq-debuginfo-0:0.0.6-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-4.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
                "product": {
                  "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
                  "product_id": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pivot-0:0.0.5-2.rhaos4.2.el8.src",
                "product": {
                  "name": "pivot-0:0.0.5-2.rhaos4.2.el8.src",
                  "product_id": "pivot-0:0.0.5-2.rhaos4.2.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pivot@0.0.5-2.rhaos4.2.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
                "product": {
                  "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
                  "product_id": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift@4.2.4-201911041319.git.0.c7d2111.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
                "product": {
                  "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
                  "product_id": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@4.2.4-201911010432.git.1.0b5cd44.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
                "product": {
                  "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
                  "product_id": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-ansible@4.2.4-201911010432.git.190.b4a7b0f.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
                "product": {
                  "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
                  "product_id": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.2.4-201911041319.git.1.4131c2f.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
                "product": {
                  "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
                  "product_id": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.2.4-201911041319.git.1.1de4bcd.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
                "product": {
                  "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
                  "product_id": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift@4.2.4-201911041319.git.0.c7d2111.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
                "product": {
                  "name": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
                  "product_id": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-kuryr@4.2.4-201911042119.git.1.d838b90.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "faq-0:0.0.6-4.el7.src",
                "product": {
                  "name": "faq-0:0.0.6-4.el7.src",
                  "product_id": "faq-0:0.0.6-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/faq@0.0.6-4.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
                "product": {
                  "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
                  "product_id": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-ansible@4.2.4-201911010432.git.190.b4a7b0f.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                "product": {
                  "name": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_id": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.2.4-201911042119.git.1.d838b90.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                "product": {
                  "name": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_id": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.2.4-201911042119.git.1.d838b90.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                "product": {
                  "name": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_id": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.2.4-201911042119.git.1.d838b90.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                "product": {
                  "name": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_id": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python2-kuryr-kubernetes@4.2.4-201911042119.git.1.d838b90.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src"
        },
        "product_reference": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64"
        },
        "product_reference": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64"
        },
        "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src"
        },
        "product_reference": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64"
        },
        "product_reference": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "faq-0:0.0.6-4.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.src"
        },
        "product_reference": "faq-0:0.0.6-4.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "faq-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.x86_64"
        },
        "product_reference": "faq-0:0.0.6-4.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:faq-debuginfo-0:0.0.6-4.el7.x86_64"
        },
        "product_reference": "faq-debuginfo-0:0.0.6-4.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src"
        },
        "product_reference": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch"
        },
        "product_reference": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src"
        },
        "product_reference": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64"
        },
        "product_reference": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64"
        },
        "product_reference": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src"
        },
        "product_reference": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64"
        },
        "product_reference": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64"
        },
        "product_reference": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src"
        },
        "product_reference": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch"
        },
        "product_reference": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch"
        },
        "product_reference": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch"
        },
        "product_reference": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch"
        },
        "product_reference": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src"
        },
        "product_reference": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src"
        },
        "product_reference": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64"
        },
        "product_reference": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64"
        },
        "product_reference": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64"
        },
        "product_reference": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pivot-0:0.0.5-2.rhaos4.2.el8.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.src"
        },
        "product_reference": "pivot-0:0.0.5-2.rhaos4.2.el8.src",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.x86_64"
        },
        "product_reference": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.src",
            "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:faq-debuginfo-0:0.0.6-4.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
            "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.src",
            "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
          "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
          "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
          "7Server-RH7-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
          "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
          "8Base-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
          "8Base-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
          "8Base-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
          "8Base-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64"
        ],
        "known_not_affected": [
          "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.src",
          "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:faq-debuginfo-0:0.0.6-4.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
          "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
          "7Server-RH7-RHOSE-4.2:openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
          "7Server-RH7-RHOSE-4.2:openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
          "7Server-RH7-RHOSE-4.2:openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
          "7Server-RH7-RHOSE-4.2:openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
          "7Server-RH7-RHOSE-4.2:python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
          "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
          "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.src",
          "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-13T16:48:38+00:00",
          "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.4, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
            "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
            "8Base-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
            "8Base-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2019:3304"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
            "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.src",
            "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:faq-debuginfo-0:0.0.6-4.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
            "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
            "8Base-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
            "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.src",
            "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    }
  ]
}
  rhsa-2020:0329
Vulnerability from csaf_redhat
Published
2020-02-04 13:21
    Modified
2025-10-15 11:13
    Summary
Red Hat Security Advisory: go-toolset:rhel8 security update
    Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
    Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)
* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling (CVE-2019-16276)\n\n* golang: invalid public key causes panic in dsa.Verify (CVE-2019-17596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:0329",
        "url": "https://access.redhat.com/errata/RHSA-2020:0329"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1755969",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
      },
      {
        "category": "external",
        "summary": "1763310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763310"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0329.json"
      }
    ],
    "title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
    "tracking": {
      "current_release_date": "2025-10-15T11:13:18+00:00",
      "generator": {
        "date": "2025-10-15T11:13:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2020:0329",
      "initial_release_date": "2020-02-04T13:21:59+00:00",
      "revision_history": [
        {
          "date": "2020-02-04T13:21:59+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-02-04T13:21:59+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-15T11:13:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.1.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
                "product": {
                  "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm (go-toolset:rhel8)",
                  "product_id": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=src\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm (go-toolset:rhel8)",
                  "product_id": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=src\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8)",
                  "product_id": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8)",
                  "product_id": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8)",
                  "product_id": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-bin@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8)",
                  "product_id": "golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-race@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8)",
                  "product_id": "golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-docs@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=noarch\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8)",
                  "product_id": "golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-misc@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=noarch\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8)",
                  "product_id": "golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-src@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=noarch\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8)",
                  "product_id": "golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-tests@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=noarch\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
                "product": {
                  "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm (go-toolset:rhel8)",
                  "product_id": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=s390x\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm (go-toolset:rhel8)",
                  "product_id": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=s390x\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm (go-toolset:rhel8)",
                  "product_id": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-bin@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=s390x\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
                "product": {
                  "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm (go-toolset:rhel8)",
                  "product_id": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm (go-toolset:rhel8)",
                  "product_id": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm (go-toolset:rhel8)",
                  "product_id": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-bin@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm (go-toolset:rhel8)",
                  "product_id": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/go-toolset@1.12.12-2.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm (go-toolset:rhel8)",
                  "product_id": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
                "product": {
                  "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm (go-toolset:rhel8)",
                  "product_id": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/golang-bin@1.12.12-4.module%2Bel8.1.0%2B5317%2B8a49ffbb?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8010020191220185136:0ed30617"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8"
        },
        "product_reference": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8"
        },
        "product_reference": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8"
        },
        "product_reference": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8"
        },
        "product_reference": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8"
        },
        "product_reference": "go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
        },
        "product_reference": "golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
        "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-02-04T13:21:59+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0329"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    },
    {
      "cve": "CVE-2019-17596",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "discovery_date": "2019-10-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1763310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: invalid public key causes panic in dsa.Verify",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
          "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "RHBZ#1763310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17596",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17596",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ"
        }
      ],
      "release_date": "2019-10-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-02-04T13:21:59+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:0329"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.src.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.aarch64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.ppc64le.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.s390x.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb.x86_64.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8",
            "AppStream-8.1.0.Z.MAIN.EUS:golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb.noarch.rpm-go-toolset:rhel8"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: invalid public key causes panic in dsa.Verify"
    }
  ]
}
  RHBA-2019:3303
Vulnerability from csaf_redhat
Published
2019-11-13 18:55
    Modified
2025-10-15 11:13
    Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 images update
    Notes
Topic
Red Hat OpenShift Container Platform release 4.2.4 is now available with
updates to packages and images that fix several bugs.
    Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat
4OpenShift Container Platform 4.2.4. See the following advisory for the
RPM packages for this release:
https://access.redhat.com/errata/RHBA-2019:3304
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-rel
ease-notes.html
You may download the oc tool and use it to inspect release image metadata
as follows:
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.2.4
The image digest is
sha256:e8ed03f1fb2ef07c15ec4c8ce1bc29962225f32572e9d36c81cf110c1bff9268
All OpenShift Container Platform 4.2 users are advised to upgrade to these
updated packages and images.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat OpenShift Container Platform release 4.2.4 is now available with\nupdates to packages and images that fix several bugs.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat\n4OpenShift Container Platform 4.2.4. See the following advisory for the\nRPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:3304\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-rel\nease-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.2.4\n\nThe image digest is\nsha256:e8ed03f1fb2ef07c15ec4c8ce1bc29962225f32572e9d36c81cf110c1bff9268\n\nAll OpenShift Container Platform 4.2 users are advised to upgrade to these\nupdated packages and images.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2019:3303",
        "url": "https://access.redhat.com/errata/RHBA-2019:3303"
      },
      {
        "category": "external",
        "summary": "1755557",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755557"
      },
      {
        "category": "external",
        "summary": "1755780",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755780"
      },
      {
        "category": "external",
        "summary": "1756478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756478"
      },
      {
        "category": "external",
        "summary": "1757134",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757134"
      },
      {
        "category": "external",
        "summary": "1757234",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757234"
      },
      {
        "category": "external",
        "summary": "1757390",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757390"
      },
      {
        "category": "external",
        "summary": "1758373",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758373"
      },
      {
        "category": "external",
        "summary": "1759181",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759181"
      },
      {
        "category": "external",
        "summary": "1759400",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759400"
      },
      {
        "category": "external",
        "summary": "1759986",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759986"
      },
      {
        "category": "external",
        "summary": "1760044",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760044"
      },
      {
        "category": "external",
        "summary": "1760480",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760480"
      },
      {
        "category": "external",
        "summary": "1761507",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761507"
      },
      {
        "category": "external",
        "summary": "1761814",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761814"
      },
      {
        "category": "external",
        "summary": "1761879",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761879"
      },
      {
        "category": "external",
        "summary": "1761887",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761887"
      },
      {
        "category": "external",
        "summary": "1762409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762409"
      },
      {
        "category": "external",
        "summary": "1762960",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1762960"
      },
      {
        "category": "external",
        "summary": "1763057",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763057"
      },
      {
        "category": "external",
        "summary": "1763205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763205"
      },
      {
        "category": "external",
        "summary": "1763279",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763279"
      },
      {
        "category": "external",
        "summary": "1763749",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763749"
      },
      {
        "category": "external",
        "summary": "1763822",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763822"
      },
      {
        "category": "external",
        "summary": "1763891",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763891"
      },
      {
        "category": "external",
        "summary": "1764227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764227"
      },
      {
        "category": "external",
        "summary": "1765308",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765308"
      },
      {
        "category": "external",
        "summary": "1767237",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767237"
      },
      {
        "category": "external",
        "summary": "1767943",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767943"
      },
      {
        "category": "external",
        "summary": "1767948",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767948"
      },
      {
        "category": "external",
        "summary": "1767951",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767951"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_3303.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 images update",
    "tracking": {
      "current_release_date": "2025-10-15T11:13:11+00:00",
      "generator": {
        "date": "2025-10-15T11:13:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHBA-2019:3303",
      "initial_release_date": "2019-11-13T18:55:26+00:00",
      "revision_history": [
        {
          "date": "2019-11-13T18:55:26+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-13T18:55:26+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-15T11:13:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "7Server-RH7-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "8Base-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
                  "product_id": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
                  "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
                  "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
                  "product_id": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.2.4-201911071400"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
                  "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
                  "product_id": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
                "product": {
                  "name": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
                  "product_id": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
                "product": {
                  "name": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
                  "product_id": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
                "product": {
                  "name": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
                  "product_id": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
                  "product_id": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
                  "product_id": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
                "product": {
                  "name": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
                  "product_id": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
                  "product_id": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
                  "product_id": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-inspector-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
                  "product_id": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-ipa-downloader-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
                  "product_id": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhcos-downloader-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64",
                "product": {
                  "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64",
                  "product_id": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-static-ip-manager-rhel8\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
                  "product_id": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
                  "product_id": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
                "product": {
                  "name": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
                  "product_id": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
                "product": {
                  "name": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
                  "product_id": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
                "product": {
                  "name": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
                  "product_id": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
                "product": {
                  "name": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
                  "product_id": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
                "product": {
                  "name": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
                  "product_id": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-controller-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
                "product": {
                  "name": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
                  "product_id": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-static-provisioner\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
                "product": {
                  "name": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
                  "product_id": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
                "product": {
                  "name": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
                  "product_id": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
                "product": {
                  "name": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
                  "product_id": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
                "product": {
                  "name": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
                  "product_id": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
                "product": {
                  "name": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
                  "product_id": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
                "product": {
                  "name": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
                  "product_id": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
                "product": {
                  "name": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
                  "product_id": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
                "product": {
                  "name": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
                  "product_id": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
                "product": {
                  "name": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
                  "product_id": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.2.4-201911071146"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
                "product": {
                  "name": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
                  "product_id": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
                "product": {
                  "name": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
                  "product_id": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
                "product": {
                  "name": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
                  "product_id": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
                "product": {
                  "name": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
                  "product_id": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-catalog\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
                "product": {
                  "name": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
                  "product_id": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.2.4-201911072324"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
                "product": {
                  "name": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
                  "product_id": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
                  "product_id": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
                "product": {
                  "name": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
                  "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
                "product": {
                  "name": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
                  "product_id": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
                "product": {
                  "name": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
                  "product_id": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
                "product": {
                  "name": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
                  "product_id": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
                  "product_id": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel7\u0026tag=v4.2.4-201911071400"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
                  "product_id": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel7-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
                "product": {
                  "name": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
                  "product_id": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
                "product": {
                  "name": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
                  "product_id": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
                "product": {
                  "name": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
                  "product_id": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
                  "product_id": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
                  "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
                  "product_id": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
                  "product_id": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
                  "product_id": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
                  "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
                  "product_id": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
                  "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
                  "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
                  "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
                  "product_id": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
                  "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
                  "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
                  "product_id": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
                  "product_id": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
                  "product_id": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-apiserver-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
                  "product_id": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-svcat-controller-manager-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
                  "product_id": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
                "product": {
                  "name": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
                  "product_id": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
                "product": {
                  "name": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
                  "product_id": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
                "product": {
                  "name": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
                  "product_id": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-machine-controllers-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
                "product": {
                  "name": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
                  "product_id": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel7-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
                "product": {
                  "name": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
                  "product_id": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.2.4-201911071400"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
                "product": {
                  "name": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
                  "product_id": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.2.4-201911071400"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
                "product": {
                  "name": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
                  "product_id": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-client-agent\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
                "product": {
                  "name": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
                  "product_id": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-etcd-signer-server\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
                "product": {
                  "name": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
                  "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
                "product": {
                  "name": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
                  "product_id": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
                "product": {
                  "name": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
                  "product_id": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
                "product": {
                  "name": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
                  "product_id": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-mdns-publisher-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
                "product": {
                  "name": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
                  "product_id": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
                "product": {
                  "name": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
                  "product_id": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
                "product": {
                  "name": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
                  "product_id": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-controller-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
                "product": {
                  "name": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
                  "product_id": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
                  "product_id": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
                "product": {
                  "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
                  "product_id": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel7\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
                "product": {
                  "name": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
                  "product_id": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
                "product": {
                  "name": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
                  "product_id": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
                "product": {
                  "name": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
                  "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
                "product": {
                  "name": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
                  "product_id": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
                  "product_id": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
                "product": {
                  "name": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
                  "product_id": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
                "product": {
                  "name": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
                  "product_id": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
                "product": {
                  "name": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
                  "product_id": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.2.4-201911050122"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
                "product": {
                  "name": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
                  "product_id": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuned\u0026tag=v4.2.4-201911050122"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64"
        },
        "product_reference": "openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64"
        },
        "product_reference": "openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64"
        },
        "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64"
        },
        "product_reference": "openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64"
        },
        "product_reference": "openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64"
        },
        "product_reference": "openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64"
        },
        "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64"
        },
        "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64"
        },
        "product_reference": "openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64"
        },
        "product_reference": "openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64"
        },
        "product_reference": "openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64"
        },
        "product_reference": "openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64"
        },
        "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64"
        },
        "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64"
        },
        "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64"
        },
        "product_reference": "openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64"
        },
        "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64"
        },
        "product_reference": "openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64"
        },
        "product_reference": "openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64"
        },
        "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64"
        },
        "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64"
        },
        "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64"
        },
        "product_reference": "openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64"
        },
        "product_reference": "openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64"
        },
        "product_reference": "openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64"
        },
        "product_reference": "openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64"
        },
        "product_reference": "openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64"
        },
        "product_reference": "openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64"
        },
        "product_reference": "openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64"
        },
        "product_reference": "openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64"
        },
        "product_reference": "openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64"
        },
        "product_reference": "openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64"
        },
        "product_reference": "openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64"
        },
        "product_reference": "openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64"
        },
        "product_reference": "openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64"
        },
        "product_reference": "openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64"
        },
        "product_reference": "openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64"
        },
        "product_reference": "openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64"
        },
        "product_reference": "openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64"
        },
        "product_reference": "openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64"
        },
        "product_reference": "openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64"
        },
        "product_reference": "openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64"
        },
        "product_reference": "openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64"
        },
        "product_reference": "openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64"
        },
        "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64"
        },
        "product_reference": "openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64"
        },
        "product_reference": "openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64"
        },
        "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64"
        },
        "product_reference": "openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64"
        },
        "product_reference": "openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64"
        },
        "product_reference": "openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64"
        },
        "product_reference": "openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64"
        },
        "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64"
        },
        "product_reference": "openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64"
        },
        "product_reference": "openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64"
        },
        "product_reference": "openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64"
        },
        "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64"
        },
        "product_reference": "openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64"
        },
        "product_reference": "openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64"
        },
        "product_reference": "openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64"
        },
        "product_reference": "openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64"
        },
        "product_reference": "openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64"
        },
        "product_reference": "openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64"
        },
        "product_reference": "openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64"
        },
        "product_reference": "openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64"
        },
        "product_reference": "openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64"
        },
        "product_reference": "openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64"
        },
        "product_reference": "openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64"
        },
        "product_reference": "openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64"
        },
        "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64"
        },
        "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64"
        },
        "product_reference": "openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64"
        },
        "product_reference": "openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64"
        },
        "product_reference": "openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64"
        },
        "product_reference": "openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64"
        },
        "product_reference": "openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64"
        },
        "product_reference": "openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64"
        },
        "product_reference": "openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64"
        },
        "product_reference": "openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64"
        },
        "product_reference": "openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64"
        },
        "product_reference": "openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64"
        },
        "product_reference": "openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64"
        },
        "product_reference": "openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64"
        },
        "product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64"
        },
        "product_reference": "openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64"
        },
        "product_reference": "openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64"
        },
        "product_reference": "openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64"
        ],
        "known_not_affected": [
          "7Server-RH7-RHOSE-4.2:openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
          "7Server-RH7-RHOSE-4.2:openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
          "8Base-RHOSE-4.2:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-13T18:55:26+00:00",
          "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.4, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2019:3303"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-4.2:openshift4/ose-aws-machine-controllers@sha256:250c62b09638e6cfa7d2225b55158c1014dd091ddbd43ef27b508e9c61afabb3_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-azure-machine-controllers@sha256:f48cc84bd7b9a2229da3ef5feb0813334976a386bb6b26825c5d7bbb5220deef_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-installer-rhel7@sha256:bc306ad9301bdb369079e3d6af5578c7995abd88e32d9aab02a01b7756b2c8eb_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-machine-controllers@sha256:2daba210534e38ae1f25a685c71da2aa10be437e179fe1d20fd1c2e041eca821_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-rhel7-operator@sha256:421e47a6d702c0d94a99f2b68afd108b53d6c9522ca6cfecc20021db3fcc007f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-baremetal-runtimecfg-rhel7@sha256:7c46244487eb52f6b8c0b983bd45c44e15c6a4c829fc389d4baac0930cd756b3_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cli-artifacts@sha256:6abb508ed4d991a964ff31df73a0bb7fceeb325c0e48d57d6be53d9e29b8b31d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cli@sha256:75534c301f7025ee45995a29b21c155308ea16020370aac3dc50dd60e15a48f5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cloud-credential-operator@sha256:c20053fdd1b497abacb079efd5ac1c8dd485c536940a3f1255b91272bf8b9cec_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-authentication-operator@sha256:f082f7984859c82708bfb88b0e7ab7d5fbbdffca7a70b86da0286d59863d7d0b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler-operator@sha256:e7c293b0b191ee5814f6ef3e137f8f291a274cb88cde73e02f1a61a1da49a32b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-autoscaler@sha256:334b801172f2cbb7e2d400d97f1c0533d53f8b8ed412e2f5027143d68d4bd39c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-bootstrap@sha256:4b536cef4b489bee21ceb22ae5c84376d3c9bbfcadaa776e7d07f20a4f165f14_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-config-operator@sha256:585c553c71f52629af7595e81c4c37e6eabd94326bbdf0cb2caab36477ebcb2d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-dns-operator@sha256:c85d339a52590c58c5c657bcc89cdd5dd2d1db2b17574e89b02b39c065491523_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-image-registry-operator@sha256:233fbef19d5afe14418e4f7b0a741f14746b9ded721b94b749b73cb366d0df0b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-ingress-operator@sha256:f3a4c70371442285ca9e17724bd97121f3a4ca638969cbc2899d7cccc05d7299_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-apiserver-operator@sha256:91a7a30b47883cc4d6cfaed0d481451d7a810045452d9baf6ead760f8f70fe83_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-controller-manager-operator@sha256:0cc51b84b503a0fac694c93fc2ac120edb0cc57f5abaf52d9221f52c83b3c37e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-kube-scheduler-operator@sha256:526e4a6523674b4ed6b39d3eb1891fc1483c3bac8316a4d044682fde010ddaeb_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-machine-approver@sha256:cbd1cb9f77cc8463b7e26127da90724f92bb0e7233976df288871fc9190a6820_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-monitoring-operator@sha256:43bd27ae0672ae0378155756c9bef47e206082fa71607e724843083424edac6b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-network-operator@sha256:50cac17dce6984fd757f74adbe66a96f31d7058dc86ebcb8c2029b5f0f00a82c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuned@sha256:37d55994d18dabf18dcc6ded9d68952b2681451ea03ea9c12ee94a5253cfae34_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-node-tuning-operator@sha256:1f81b189a4d32e856b707205e4a91e246ac557852ede10bdd65bb318e28eecec_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-apiserver-operator@sha256:a5d2f9b14e8792fed6103a10ac01f59e8742018a3b8f8db4d4c77e7763d7be83_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:06cd0aa4c5a60cad2a59dfdd81260dcdbe492b8299d08474d2b7a1dbe1975a06_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-samples-operator@sha256:9a2546b45823772200083b4603a65069ebe3c589f25257085fb0b46cea6f5d1c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-storage-operator@sha256:33e1fdc4421b9cfdc675b1ee129726ab3ddf26ae6b65b4b173cea9633ebbc594_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-apiserver-operator@sha256:89d7d10f478dc0af14df5a196558f7f574e137e649519acce654899368b5453e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-svcat-controller-manager-operator@sha256:c28a97f9960e02f6469588328c5e18a587bdefa310d547e57acfba438fc703db_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-update-keys@sha256:30ab9b57566cfa2bb79500bb538c850fc517a0eccf7097cfbef65cec834088f6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-cluster-version-operator@sha256:12de90d3c6d076731607322138d7fb117fe879d4d5ba3bce6674fd35df04939e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-configmap-reloader@sha256:93cf21818601f537507b0169a0badfd62b1d0d7ff7a1ac988921ee07971b3411_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-console-operator@sha256:06ff20cbb0f3668be8b4cd545a399073d67fcd8026269a7f0da3fc36b6e0c867_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-console@sha256:1e27ffe37d65d8cc12ed0eb9bc93f66ba03ac61fb2e7f2d1f258eba0b3f5159e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-container-networking-plugins-rhel7@sha256:cf663f087d6f23e354fa4dc77427ba1805e12b343c78d59719489c541cd647e5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-coredns@sha256:bb507aff0831dc2fa73b5b2ad7cd48c87c92aa63090863250e455342b5330864_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-deployer@sha256:6503f65835b5dcff78593d91f2d5af2439d840f61a031042d836218f05e41e5f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-builder@sha256:9ea50724e5375b3b35ec862db891e3bed50acd7bc0d9fb9d3daaf3750fac8be4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-docker-registry@sha256:9f0892cc064b5ae214018b88035b9e3ae406f7ef291f8dd0dc1abe91e212c96f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-etcd@sha256:f1f87d556ae78b19bacc300237c80d5a595689c59c42ccbfea1f2bddeee5788d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-gcp-machine-controllers-rhel7@sha256:a2849e3e9ec8e1a089e407c159f2728330e29b0cafe472999bb472719ecbce8c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-grafana@sha256:d0a768b328417ab619d5508f0bcbcb7b42061376d5e9525488bb1a2ddd662825_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-haproxy-router@sha256:3f0b7726741f00cc06e3c594e4f5d2db08da4c5cd0cd7bf14a467668ec5f07c0_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-hyperkube@sha256:a9c6fb281a7291f4e5a84fe3200e0efa487795282db5a76099f4b1c7bdc2662f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-insights-rhel7-operator@sha256:b9bc2c35d6bb75a17950fbfdf365340ae948c07de0be4e0bb30150b57285d4ad_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer-artifacts@sha256:15e10005f6ebbd936d4362405ced5337b1e65723916f567366338dead0683147_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-installer@sha256:943662ef37feaeb792f0caa3dbda038c4a69a7ea7f4b5a271e56384d54169d6e_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-maven@sha256:9f7632f2b3a17cc409a7385aee3ef4ae3e9e268e19296fb8af1fa5929b9bcd96_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins-agent-nodejs@sha256:b7637e2e5ef96b9f577ff88c9950aecfaaddeaa8960d343f7c250e22606bf8c6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-jenkins@sha256:2d1f8a9ff4bfa1202e17f45a633f94c5a8e2d2b0e15defe1c60e69096fd823f4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-k8s-prometheus-adapter@sha256:9c5629ef379647cdcfa19ba709c061b01759e029d8918cb0595ddcb3aa13ef44_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-keepalived-ipfailover@sha256:01a6f3fbd5eb67c73319ee4aec286f1ac21b08434ffa216d17273812281d24ca_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-client-agent@sha256:82842ba29042e44ffc87e8be3c8068ee52994e8ecf3f4b2400a5e545b47d293b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-etcd-signer-server@sha256:b24b57b05d210df07a9f7a111f40d1ee9fcfc5c354bf711083899fce9884501f_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-proxy@sha256:4933db104cf3dc7f7487904a40719f91c4806047eeb02cdb165d7aceb37b1ff5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-rbac-proxy@sha256:cf44080491a81dd53d683bca8fbfd8d51639ff8ba460e56b45f3455c6e6fa0c1_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kube-state-metrics@sha256:b3f65d57d0dc9c8b9c3e55ba18d2aee5ef954e21d9ecf9c0dc9fddd97d9edfe6_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-cni-rhel7@sha256:573ff57f3f766bda1d4adad5e80d0495e08e87d3892edd2251b83d45e0082339_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-kuryr-controller-rhel7@sha256:1d149827c727dc33c015eac7f434ed9dc8f46282a417250176bd32ee8fa93857_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-libvirt-machine-controllers@sha256:331699acda98c5cc1bcad059bfe07eca8478105832c38f7fdfd80a6ef90a3022_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-local-storage-static-provisioner@sha256:33c933cae718ca5de9ca1ad7694bd16fc10ac7c51f5eb256f569ea60587f9a47_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-api-operator@sha256:292e6dcfcaf260c1ab51939b1952f20403c28547376a8a5ab2af49600fdc5a3a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-machine-config-operator@sha256:2718d42a03608c657c255a9019a6d2bbebf556546b745492dd249d1ef630ab72_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-mdns-publisher-rhel7@sha256:89b4ffe04eb0b48c2f734e3d2ecae6ff5803ef521e048968dcbf166e8739f18a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-admission-controller@sha256:cc36c1ea41a50aeac75abd18d6072b2771672c13f70200d17cc6d752b7e64a89_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-multus-cni@sha256:55697815941b9d640533256ba35cb52b3f26cb5d472a96cc7610a394eb6b48ca_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-must-gather@sha256:2bebbc3d547d70cb8caea206a567642f5ab1c7e098ddba55bf7e64b5c58534f2_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-node@sha256:fb6bdabf98794c00d2efc5d84527b9f16e513d2b7cf701bb24d8faaf1716e9aa_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-oauth-proxy@sha256:737b9f043fb85469441af421d0549146648fbfd04b0ef990dbcc7531c23bf1c9_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-apiserver-rhel7@sha256:9d34085d3716de4b348d12e8a41b14f9443357e7f76f548612e124a795a8c07c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-controller-manager-rhel7@sha256:a8d6ca0c1bf5cf8101b3742c0ae38d28627eb49f49062a0e18301195838d1442_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openshift-state-metrics-rhel7@sha256:c066a37d778ec86d4383ab0b1de8f6fdc05665e5a355dca6c18dd3b2aad18c54_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-openstack-machine-controllers@sha256:d98bd2e3f24b67b87ae2d999ce689bc20ae7ea1640180879d6f067592e716ec4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-lifecycle-manager@sha256:61e2a9dc056f2622071ad63aa63a5b3b0776ddcbd9389aceacf36cf290ba343b_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-marketplace@sha256:211403f781d6d704857d9262680b247575db0209f6660b3cd4da06e01ed44f2d_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-operator-registry@sha256:0524536b3a5c1ee235a4c661ef66f524471641ccdcac556443a686cd2414b380_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-ovn-kubernetes@sha256:a84018cec415f8b0398e6a1739439278bcc2fdd4180ee0ac90cd7e10e9dd9d7a_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-pod@sha256:53c5f6c15bfd4e42094291384485dac706df5661971f25253ad4096fee4ba5b2_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prom-label-proxy@sha256:f57c717539e3c5015a222e9fce80cb310c822fe73bc1417b9153bac133b66c05_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-alertmanager@sha256:3ae1d04427f80ba6d9a2dd421d2a245393e279954444087880835dbb05867ca4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-config-reloader@sha256:ee1e29644837e48b725b90fa360458b7413d64bde97fc21b7558836617bd0cc4_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-node-exporter@sha256:61a07ec4339553f5b39d39d6fe216ab78cd4670233c2cf387e51cb50d51638e5_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-prometheus-operator@sha256:73a524a5e1d2192127f33210523ed457cb9d520ccdb8c825a119af2a529d3afd_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-sdn-controller-rhel7@sha256:74114157e75612785c0652ac96e803608fd67a360f714e0f20df39179513732c_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-service-ca-operator@sha256:a5cb4397131628ef8106b85ad3359ed8f6565d45cc50798a0a04fb801504f2aa_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-service-catalog@sha256:e496a8df57d81444b979659dc4578a65bde8d6c89a50347cdee63572c69c8955_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-telemeter@sha256:74e42ebecb258ca0419280345c130c3cefb69bc1442ac102577300fea3200917_amd64",
            "7Server-RH7-RHOSE-4.2:openshift4/ose-tests@sha256:22ca34f2395c7f946b8e0f44dce5191ab788f7ea40ea5a96919e8ad2a98abb54_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-inspector-rhel8@sha256:34f23d6062b84bd486cd0870c237f0e1deb830c1d4974dca696fc9439fb86a86_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-ipa-downloader-rhel8@sha256:19aa09b589596f53751361fce554f6c2a33d9ec5d28ac67b1951afa53417404f_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-rhcos-downloader-rhel8@sha256:f8abeceade59b916ac2c057ed04f93673583b2f9449aef1d9d146ce709223676_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-rhel8@sha256:26ab91cce75881fa45cdb4aadf045cae76aa7a10f2c192624bcda0913522ed54_amd64",
            "8Base-RHOSE-4.2:openshift4/ose-ironic-static-ip-manager-rhel8@sha256:618d4dd1c805e5e0f392328ee259b2cecb20c9eb4f1620a88b24cad0525df395_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    }
  ]
}
  rhba-2019:3304
Vulnerability from csaf_redhat
Published
2019-11-13 16:48
    Modified
2025-10-15 11:13
    Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 bug fix update
    Notes
Topic
Red Hat OpenShift Container Platform release 4.2.4 is now available with
updates to packages and images that fix several bugs.
    Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat
OpenShift Container Platform 4.2.4. See the following advisory for the
container images for this release:
https://access.redhat.com/errata/RHBA-2019:3303
All OpenShift Container Platform 4.2 users are advised to upgrade to these
updated packages and images.
    Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat OpenShift Container Platform release 4.2.4 is now available with\nupdates to packages and images that fix several bugs.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat\nOpenShift Container Platform 4.2.4. See the following advisory for the\ncontainer images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:3303\n\nAll OpenShift Container Platform 4.2 users are advised to upgrade to these\nupdated packages and images.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2019:3304",
        "url": "https://access.redhat.com/errata/RHBA-2019:3304"
      },
      {
        "category": "external",
        "summary": "1765304",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765304"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_3304.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 bug fix update",
    "tracking": {
      "current_release_date": "2025-10-15T11:13:14+00:00",
      "generator": {
        "date": "2025-10-15T11:13:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHBA-2019:3304",
      "initial_release_date": "2019-11-13T16:48:38+00:00",
      "revision_history": [
        {
          "date": "2019-11-13T16:48:38+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2019-11-13T16:48:38+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-15T11:13:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "8Base-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Container Platform 4.2",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.2",
                  "product_id": "7Server-RH7-RHOSE-4.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:4.2::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition-validate@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition-debugsource@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition-debuginfo@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                "product": {
                  "name": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_id": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64",
                "product": {
                  "name": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64",
                  "product_id": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pivot@0.0.5-2.rhaos4.2.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                "product": {
                  "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                  "product_id": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-clients@4.2.4-201911010432.git.1.30c33a5.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                "product": {
                  "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                  "product_id": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.2.4-201911010432.git.1.30c33a5.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
                "product": {
                  "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
                  "product_id": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-hyperkube@4.2.4-201911041319.git.0.c7d2111.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
                "product": {
                  "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
                  "product_id": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@4.2.4-201911010432.git.1.0b5cd44.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                "product": {
                  "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                  "product_id": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-clients@4.2.4-201911010432.git.1.30c33a5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                "product": {
                  "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                  "product_id": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.2.4-201911010432.git.1.30c33a5.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
                "product": {
                  "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
                  "product_id": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.2.4-201911041319.git.1.4131c2f.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                "product": {
                  "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                  "product_id": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.2.4-201911041319.git.1.1de4bcd.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                "product": {
                  "name": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                  "product_id": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.2.4-201911041319.git.1.1de4bcd.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
                "product": {
                  "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
                  "product_id": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-hyperkube@4.2.4-201911041319.git.0.c7d2111.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "faq-0:0.0.6-4.el7.x86_64",
                "product": {
                  "name": "faq-0:0.0.6-4.el7.x86_64",
                  "product_id": "faq-0:0.0.6-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/faq@0.0.6-4.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64",
                "product": {
                  "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64",
                  "product_id": "faq-debuginfo-0:0.0.6-4.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-4.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
                "product": {
                  "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
                  "product_id": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ignition@0.33.0-6.rhaos4.2.gitc65e95c.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pivot-0:0.0.5-2.rhaos4.2.el8.src",
                "product": {
                  "name": "pivot-0:0.0.5-2.rhaos4.2.el8.src",
                  "product_id": "pivot-0:0.0.5-2.rhaos4.2.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pivot@0.0.5-2.rhaos4.2.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
                "product": {
                  "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
                  "product_id": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift@4.2.4-201911041319.git.0.c7d2111.el8?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
                "product": {
                  "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
                  "product_id": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@4.2.4-201911010432.git.1.0b5cd44.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
                "product": {
                  "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
                  "product_id": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-ansible@4.2.4-201911010432.git.190.b4a7b0f.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
                "product": {
                  "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
                  "product_id": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.2.4-201911041319.git.1.4131c2f.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
                "product": {
                  "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
                  "product_id": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.2.4-201911041319.git.1.1de4bcd.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
                "product": {
                  "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
                  "product_id": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift@4.2.4-201911041319.git.0.c7d2111.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
                "product": {
                  "name": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
                  "product_id": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-kuryr@4.2.4-201911042119.git.1.d838b90.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "faq-0:0.0.6-4.el7.src",
                "product": {
                  "name": "faq-0:0.0.6-4.el7.src",
                  "product_id": "faq-0:0.0.6-4.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/faq@0.0.6-4.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
                "product": {
                  "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
                  "product_id": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-ansible@4.2.4-201911010432.git.190.b4a7b0f.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                "product": {
                  "name": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_id": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.2.4-201911042119.git.1.d838b90.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                "product": {
                  "name": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_id": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.2.4-201911042119.git.1.d838b90.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                "product": {
                  "name": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_id": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.2.4-201911042119.git.1.d838b90.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                "product": {
                  "name": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_id": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python2-kuryr-kubernetes@4.2.4-201911042119.git.1.d838b90.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src"
        },
        "product_reference": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64"
        },
        "product_reference": "atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64"
        },
        "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src"
        },
        "product_reference": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64"
        },
        "product_reference": "atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "faq-0:0.0.6-4.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.src"
        },
        "product_reference": "faq-0:0.0.6-4.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "faq-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.x86_64"
        },
        "product_reference": "faq-0:0.0.6-4.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:faq-debuginfo-0:0.0.6-4.el7.x86_64"
        },
        "product_reference": "faq-debuginfo-0:0.0.6-4.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src"
        },
        "product_reference": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch"
        },
        "product_reference": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src"
        },
        "product_reference": "openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64"
        },
        "product_reference": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64"
        },
        "product_reference": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src"
        },
        "product_reference": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64"
        },
        "product_reference": "openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64"
        },
        "product_reference": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src"
        },
        "product_reference": "openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch"
        },
        "product_reference": "openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch"
        },
        "product_reference": "openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch"
        },
        "product_reference": "openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "7Server-RH7-RHOSE-4.2:python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch"
        },
        "product_reference": "python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
        "relates_to_product_reference": "7Server-RH7-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src"
        },
        "product_reference": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64"
        },
        "product_reference": "ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src"
        },
        "product_reference": "openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64"
        },
        "product_reference": "openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64"
        },
        "product_reference": "openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64"
        },
        "product_reference": "openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pivot-0:0.0.5-2.rhaos4.2.el8.src as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.src"
        },
        "product_reference": "pivot-0:0.0.5-2.rhaos4.2.el8.src",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.2",
          "product_id": "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.x86_64"
        },
        "product_reference": "pivot-0:0.0.5-2.rhaos4.2.el8.x86_64",
        "relates_to_product_reference": "8Base-RHOSE-4.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2019-09-26T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.src",
            "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:faq-debuginfo-0:0.0.6-4.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
            "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.src",
            "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1755969"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "* This issue affects the versions of golang as shipped with Red Hat Enterprise Linux 7, however it was deprecated in Red Hat Enterprise Linux 7.6 and it does not receive updates anymore. Developers are encouraged to use the Go Toolset instead, which is available through the Red Hat Developer program. See https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/chap-red_hat_enterprise_linux-7.6_release_notes-other_deprecated_functionality#idm140555585405248.\n* The version of golang provided in Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3 allows filter bypasses or request smuggling and contains the vulnerable code hence affected by this vulnerability.\n* In OpenShift Container Platform, all packages and container images built with a vulnerable version of Go and use the net/http package are affected by this flaw.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
          "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
          "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
          "7Server-RH7-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
          "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
          "8Base-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
          "8Base-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
          "8Base-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
          "8Base-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64"
        ],
        "known_not_affected": [
          "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.src",
          "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:faq-debuginfo-0:0.0.6-4.el7.x86_64",
          "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
          "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
          "7Server-RH7-RHOSE-4.2:openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
          "7Server-RH7-RHOSE-4.2:openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
          "7Server-RH7-RHOSE-4.2:openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
          "7Server-RH7-RHOSE-4.2:openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
          "7Server-RH7-RHOSE-4.2:python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
          "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
          "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
          "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.src",
          "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "RHBZ#1755969",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755969"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16276",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
          "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
        }
      ],
      "release_date": "2019-09-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2019-11-13T16:48:38+00:00",
          "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.4, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html",
          "product_ids": [
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
            "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
            "8Base-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
            "8Base-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2019:3304"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.src",
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:atomic-enterprise-service-catalog-svcat-1:4.2.4-201911041319.git.1.1de4bcd.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.src",
            "7Server-RH7-RHOSE-4.2:atomic-openshift-service-idler-0:4.2.4-201911041319.git.1.4131c2f.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.src",
            "7Server-RH7-RHOSE-4.2:faq-0:0.0.6-4.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:faq-debuginfo-0:0.0.6-4.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-ansible-0:4.2.4-201911010432.git.190.b4a7b0f.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-enterprise-autoheal-0:4.2.4-201911010432.git.1.0b5cd44.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el7.x86_64",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-0:4.2.4-201911042119.git.1.d838b90.el7.src",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-cni-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-common-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:openshift-kuryr-controller-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "7Server-RH7-RHOSE-4.2:python2-kuryr-kubernetes-0:4.2.4-201911042119.git.1.d838b90.el7.noarch",
            "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.src",
            "8Base-RHOSE-4.2:ignition-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-debugsource-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-validate-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:ignition-validate-debuginfo-0:0.33.0-6.rhaos4.2.gitc65e95c.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-0:4.2.4-201911041319.git.0.c7d2111.el8.src",
            "8Base-RHOSE-4.2:openshift-clients-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-clients-redistributable-0:4.2.4-201911010432.git.1.30c33a5.el8.x86_64",
            "8Base-RHOSE-4.2:openshift-hyperkube-0:4.2.4-201911041319.git.0.c7d2111.el8.x86_64",
            "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.src",
            "8Base-RHOSE-4.2:pivot-0:0.0.5-2.rhaos4.2.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling"
    }
  ]
}
  msrc_cve-2019-16276
Vulnerability from csaf_microsoft
Published
2019-09-02 00:00
    Modified
2024-09-11 00:00
    Summary
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
    Notes
Additional Resources
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
    Disclaimer
The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
    {
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2019-16276 Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling. - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2019/msrc_cve-2019-16276.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.",
    "tracking": {
      "current_release_date": "2024-09-11T00:00:00.000Z",
      "generator": {
        "date": "2025-10-19T17:45:05.503Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2019-16276",
      "initial_release_date": "2019-09-02T00:00:00.000Z",
      "revision_history": [
        {
          "date": "2024-09-11T00:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Azure Linux 3.0",
                  "product_id": "16817"
                }
              },
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Azure Linux 3.0",
                  "product_id": "17084"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cazl3 python-tensorboard 2.16.2-2",
                "product": {
                  "name": "\u003cazl3 python-tensorboard 2.16.2-2",
                  "product_id": "2"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 python-tensorboard 2.16.2-2",
                "product": {
                  "name": "azl3 python-tensorboard 2.16.2-2",
                  "product_id": "17021"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 python-tensorboard 2.16.2-2",
                "product": {
                  "name": "\u003cazl3 python-tensorboard 2.16.2-2",
                  "product_id": "3"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 python-tensorboard 2.16.2-2",
                "product": {
                  "name": "azl3 python-tensorboard 2.16.2-2",
                  "product_id": "17021"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 python-tensorboard 2.11.0-3",
                "product": {
                  "name": "\u003cazl3 python-tensorboard 2.11.0-3",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 python-tensorboard 2.11.0-3",
                "product": {
                  "name": "azl3 python-tensorboard 2.11.0-3",
                  "product_id": "19696"
                }
              }
            ],
            "category": "product_name",
            "name": "python-tensorboard"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 python-tensorboard 2.16.2-2 as a component of Azure Linux 3.0",
          "product_id": "16817-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "16817"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 python-tensorboard 2.16.2-2 as a component of Azure Linux 3.0",
          "product_id": "17021-16817"
        },
        "product_reference": "17021",
        "relates_to_product_reference": "16817"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 python-tensorboard 2.16.2-2 as a component of Azure Linux 3.0",
          "product_id": "17084-3"
        },
        "product_reference": "3",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 python-tensorboard 2.16.2-2 as a component of Azure Linux 3.0",
          "product_id": "17021-17084"
        },
        "product_reference": "17021",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 python-tensorboard 2.11.0-3 as a component of Azure Linux 3.0",
          "product_id": "17084-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 python-tensorboard 2.11.0-3 as a component of Azure Linux 3.0",
          "product_id": "19696-17084"
        },
        "product_reference": "19696",
        "relates_to_product_reference": "17084"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "notes": [
        {
          "category": "general",
          "text": "mitre",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "17021-16817",
          "17021-17084",
          "19696-17084"
        ],
        "known_affected": [
          "16817-2",
          "17084-3",
          "17084-1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2019-16276 Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling. - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2019/msrc_cve-2019-16276.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-09-11T00:00:00.000Z",
          "details": "2.16.2-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "16817-2",
            "17084-3",
            "17084-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "environmentalsScore": 0.0,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 7.5,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "16817-2",
            "17084-3",
            "17084-1"
          ]
        }
      ],
      "title": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling."
    }
  ]
}
  gsd-2019-16276
Vulnerability from gsd
Modified
2023-12-13 01:23
      Details
        
          Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
        
      Aliases
        
      Aliases
        
      {
  "GSD": {
    "alias": "CVE-2019-16276",
    "description": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.",
    "id": "GSD-2019-16276",
    "references": [
      "https://www.suse.com/security/cve/CVE-2019-16276.html",
      "https://www.debian.org/security/2019/dsa-4534",
      "https://access.redhat.com/errata/RHSA-2020:0652",
      "https://access.redhat.com/errata/RHSA-2020:0329",
      "https://access.redhat.com/errata/RHSA-2020:0101",
      "https://access.redhat.com/errata/RHBA-2020:0062",
      "https://access.redhat.com/errata/RHBA-2019:3304",
      "https://access.redhat.com/errata/RHBA-2019:3303",
      "https://security.archlinux.org/CVE-2019-16276",
      "https://alas.aws.amazon.com/cve/html/CVE-2019-16276.html",
      "https://linux.oracle.com/cve/CVE-2019-16276.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2019-16276"
      ],
      "details": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.",
      "id": "GSD-2019-16276",
      "modified": "2023-12-13T01:23:40.558927Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2019-16276",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://github.com/golang/go/issues/34540",
            "refsource": "CONFIRM",
            "url": "https://github.com/golang/go/issues/34540"
          },
          {
            "name": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
            "refsource": "MISC",
            "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
          },
          {
            "name": "FEDORA-2019-1b8cbd39ff",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/"
          },
          {
            "name": "FEDORA-2019-416d20f960",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/"
          },
          {
            "name": "FEDORA-2019-e99c1603c3",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/"
          },
          {
            "name": "openSUSE-SU-2019:2522",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html"
          },
          {
            "name": "openSUSE-SU-2019:2521",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20191122-0004/",
            "refsource": "CONFIRM",
            "url": "https://security.netapp.com/advisory/ntap-20191122-0004/"
          },
          {
            "name": "RHSA-2020:0101",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2020:0101"
          },
          {
            "name": "RHSA-2020:0329",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2020:0329"
          },
          {
            "name": "RHSA-2020:0652",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2020:0652"
          },
          {
            "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update",
            "refsource": "MLIST",
            "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html"
          },
          {
            "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update",
            "refsource": "MLIST",
            "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "1.13.1",
                "versionStartIncluding": "1.13",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "1.12.10",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:netapp:cloud_insights_telegraf_agent:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-16276"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-444"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ",
              "refsource": "MISC",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
            },
            {
              "name": "https://github.com/golang/go/issues/34540",
              "refsource": "CONFIRM",
              "tags": [
                "Patch",
                "Third Party Advisory"
              ],
              "url": "https://github.com/golang/go/issues/34540"
            },
            {
              "name": "FEDORA-2019-1b8cbd39ff",
              "refsource": "FEDORA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/"
            },
            {
              "name": "FEDORA-2019-416d20f960",
              "refsource": "FEDORA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/"
            },
            {
              "name": "FEDORA-2019-e99c1603c3",
              "refsource": "FEDORA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/"
            },
            {
              "name": "openSUSE-SU-2019:2521",
              "refsource": "SUSE",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html"
            },
            {
              "name": "openSUSE-SU-2019:2522",
              "refsource": "SUSE",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20191122-0004/",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.netapp.com/advisory/ntap-20191122-0004/"
            },
            {
              "name": "RHSA-2020:0101",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2020:0101"
            },
            {
              "name": "RHSA-2020:0329",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2020:0329"
            },
            {
              "name": "RHSA-2020:0652",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2020:0652"
            },
            {
              "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html"
            },
            {
              "name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "exploitabilityScore": 10.0,
          "impactScore": 2.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 3.6
        }
      },
      "lastModifiedDate": "2021-03-22T13:19Z",
      "publishedDate": "2019-09-30T19:15Z"
    }
  }
}
  opensuse-su-2019:2521-1
Vulnerability from csaf_opensuse
Published
2019-11-17 19:22
    Modified
2019-11-17 19:22
    Summary
Security update for go1.12
    Notes
Title of the patch
Security update for go1.12
    Description of the patch
This update for go1.12 fixes the following issues:
Security issues fixed:
- CVE-2019-16276: Fixed the handling of invalid HTTP headers, which had allowed request smuggling (bsc#1152082).
- CVE-2019-17596: Fixed a panic in dsa.Verify caused by invalid public keys (bsc#1154402).
Non-security issue fixed:
- Go was updated to version 1.12.12 (bsc#1141689).
This update was imported from the SUSE:SLE-15:Update update project.
    Patchnames
openSUSE-2019-2521
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for go1.12",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for go1.12 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-16276: Fixed the handling of invalid HTTP headers, which had allowed request smuggling (bsc#1152082).\n- CVE-2019-17596: Fixed a panic in dsa.Verify caused by invalid public keys (bsc#1154402).\n\nNon-security issue fixed:\n\n- Go was updated to version 1.12.12 (bsc#1141689).\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2019-2521",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2521-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2019:2521-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUPUAVRZNZNRO55OYBYHREZH7KIAIZQ2/#HUPUAVRZNZNRO55OYBYHREZH7KIAIZQ2"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2019:2521-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUPUAVRZNZNRO55OYBYHREZH7KIAIZQ2/#HUPUAVRZNZNRO55OYBYHREZH7KIAIZQ2"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1141689",
        "url": "https://bugzilla.suse.com/1141689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152082",
        "url": "https://bugzilla.suse.com/1152082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154402",
        "url": "https://bugzilla.suse.com/1154402"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16276 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16276/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17596 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17596/"
      }
    ],
    "title": "Security update for go1.12",
    "tracking": {
      "current_release_date": "2019-11-17T19:22:02Z",
      "generator": {
        "date": "2019-11-17T19:22:02Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2019:2521-1",
      "initial_release_date": "2019-11-17T19:22:02Z",
      "revision_history": [
        {
          "date": "2019-11-17T19:22:02Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.12-1.12.12-lp150.11.1.x86_64",
                "product": {
                  "name": "go1.12-1.12.12-lp150.11.1.x86_64",
                  "product_id": "go1.12-1.12.12-lp150.11.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.12-doc-1.12.12-lp150.11.1.x86_64",
                "product": {
                  "name": "go1.12-doc-1.12.12-lp150.11.1.x86_64",
                  "product_id": "go1.12-doc-1.12.12-lp150.11.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.12-race-1.12.12-lp150.11.1.x86_64",
                "product": {
                  "name": "go1.12-race-1.12.12-lp150.11.1.x86_64",
                  "product_id": "go1.12-race-1.12.12-lp150.11.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.0",
                "product": {
                  "name": "openSUSE Leap 15.0",
                  "product_id": "openSUSE Leap 15.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-1.12.12-lp150.11.1.x86_64 as component of openSUSE Leap 15.0",
          "product_id": "openSUSE Leap 15.0:go1.12-1.12.12-lp150.11.1.x86_64"
        },
        "product_reference": "go1.12-1.12.12-lp150.11.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-doc-1.12.12-lp150.11.1.x86_64 as component of openSUSE Leap 15.0",
          "product_id": "openSUSE Leap 15.0:go1.12-doc-1.12.12-lp150.11.1.x86_64"
        },
        "product_reference": "go1.12-doc-1.12.12-lp150.11.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-race-1.12.12-lp150.11.1.x86_64 as component of openSUSE Leap 15.0",
          "product_id": "openSUSE Leap 15.0:go1.12-race-1.12.12-lp150.11.1.x86_64"
        },
        "product_reference": "go1.12-race-1.12.12-lp150.11.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16276"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.0:go1.12-1.12.12-lp150.11.1.x86_64",
          "openSUSE Leap 15.0:go1.12-doc-1.12.12-lp150.11.1.x86_64",
          "openSUSE Leap 15.0:go1.12-race-1.12.12-lp150.11.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16276",
          "url": "https://www.suse.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1152082 for CVE-2019-16276",
          "url": "https://bugzilla.suse.com/1152082"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.0:go1.12-1.12.12-lp150.11.1.x86_64",
            "openSUSE Leap 15.0:go1.12-doc-1.12.12-lp150.11.1.x86_64",
            "openSUSE Leap 15.0:go1.12-race-1.12.12-lp150.11.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.0:go1.12-1.12.12-lp150.11.1.x86_64",
            "openSUSE Leap 15.0:go1.12-doc-1.12.12-lp150.11.1.x86_64",
            "openSUSE Leap 15.0:go1.12-race-1.12.12-lp150.11.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-11-17T19:22:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16276"
    },
    {
      "cve": "CVE-2019-17596",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17596"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.0:go1.12-1.12.12-lp150.11.1.x86_64",
          "openSUSE Leap 15.0:go1.12-doc-1.12.12-lp150.11.1.x86_64",
          "openSUSE Leap 15.0:go1.12-race-1.12.12-lp150.11.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17596",
          "url": "https://www.suse.com/security/cve/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1154402 for CVE-2019-17596",
          "url": "https://bugzilla.suse.com/1154402"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.0:go1.12-1.12.12-lp150.11.1.x86_64",
            "openSUSE Leap 15.0:go1.12-doc-1.12.12-lp150.11.1.x86_64",
            "openSUSE Leap 15.0:go1.12-race-1.12.12-lp150.11.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Leap 15.0:go1.12-1.12.12-lp150.11.1.x86_64",
            "openSUSE Leap 15.0:go1.12-doc-1.12.12-lp150.11.1.x86_64",
            "openSUSE Leap 15.0:go1.12-race-1.12.12-lp150.11.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-11-17T19:22:02Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-17596"
    }
  ]
}
  opensuse-su-2024:10806-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
    Modified
2024-06-15 00:00
    Summary
go1.13-1.13.15-2.6 on GA media
    Notes
Title of the patch
go1.13-1.13.15-2.6 on GA media
    Description of the patch
These are all security issues fixed in the go1.13-1.13.15-2.6 package on the GA media of openSUSE Tumbleweed.
    Patchnames
openSUSE-Tumbleweed-2024-10806
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "go1.13-1.13.15-2.6 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the go1.13-1.13.15-2.6 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-10806",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10806-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16276 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16276/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17596 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17596/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14039 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14039/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-15586 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-15586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-16845 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-16845/"
      }
    ],
    "title": "go1.13-1.13.15-2.6 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:10806-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.13-1.13.15-2.6.aarch64",
                "product": {
                  "name": "go1.13-1.13.15-2.6.aarch64",
                  "product_id": "go1.13-1.13.15-2.6.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.13-doc-1.13.15-2.6.aarch64",
                "product": {
                  "name": "go1.13-doc-1.13.15-2.6.aarch64",
                  "product_id": "go1.13-doc-1.13.15-2.6.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.13-race-1.13.15-2.6.aarch64",
                "product": {
                  "name": "go1.13-race-1.13.15-2.6.aarch64",
                  "product_id": "go1.13-race-1.13.15-2.6.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.13-1.13.15-2.6.ppc64le",
                "product": {
                  "name": "go1.13-1.13.15-2.6.ppc64le",
                  "product_id": "go1.13-1.13.15-2.6.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "go1.13-doc-1.13.15-2.6.ppc64le",
                "product": {
                  "name": "go1.13-doc-1.13.15-2.6.ppc64le",
                  "product_id": "go1.13-doc-1.13.15-2.6.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "go1.13-race-1.13.15-2.6.ppc64le",
                "product": {
                  "name": "go1.13-race-1.13.15-2.6.ppc64le",
                  "product_id": "go1.13-race-1.13.15-2.6.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.13-1.13.15-2.6.s390x",
                "product": {
                  "name": "go1.13-1.13.15-2.6.s390x",
                  "product_id": "go1.13-1.13.15-2.6.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "go1.13-doc-1.13.15-2.6.s390x",
                "product": {
                  "name": "go1.13-doc-1.13.15-2.6.s390x",
                  "product_id": "go1.13-doc-1.13.15-2.6.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "go1.13-race-1.13.15-2.6.s390x",
                "product": {
                  "name": "go1.13-race-1.13.15-2.6.s390x",
                  "product_id": "go1.13-race-1.13.15-2.6.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.13-1.13.15-2.6.x86_64",
                "product": {
                  "name": "go1.13-1.13.15-2.6.x86_64",
                  "product_id": "go1.13-1.13.15-2.6.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.13-doc-1.13.15-2.6.x86_64",
                "product": {
                  "name": "go1.13-doc-1.13.15-2.6.x86_64",
                  "product_id": "go1.13-doc-1.13.15-2.6.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.13-race-1.13.15-2.6.x86_64",
                "product": {
                  "name": "go1.13-race-1.13.15-2.6.x86_64",
                  "product_id": "go1.13-race-1.13.15-2.6.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.13-1.13.15-2.6.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64"
        },
        "product_reference": "go1.13-1.13.15-2.6.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.13-1.13.15-2.6.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le"
        },
        "product_reference": "go1.13-1.13.15-2.6.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.13-1.13.15-2.6.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x"
        },
        "product_reference": "go1.13-1.13.15-2.6.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.13-1.13.15-2.6.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64"
        },
        "product_reference": "go1.13-1.13.15-2.6.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.13-doc-1.13.15-2.6.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64"
        },
        "product_reference": "go1.13-doc-1.13.15-2.6.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.13-doc-1.13.15-2.6.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le"
        },
        "product_reference": "go1.13-doc-1.13.15-2.6.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.13-doc-1.13.15-2.6.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x"
        },
        "product_reference": "go1.13-doc-1.13.15-2.6.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.13-doc-1.13.15-2.6.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64"
        },
        "product_reference": "go1.13-doc-1.13.15-2.6.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.13-race-1.13.15-2.6.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64"
        },
        "product_reference": "go1.13-race-1.13.15-2.6.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.13-race-1.13.15-2.6.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le"
        },
        "product_reference": "go1.13-race-1.13.15-2.6.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.13-race-1.13.15-2.6.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x"
        },
        "product_reference": "go1.13-race-1.13.15-2.6.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.13-race-1.13.15-2.6.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
        },
        "product_reference": "go1.13-race-1.13.15-2.6.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16276"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16276",
          "url": "https://www.suse.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1152082 for CVE-2019-16276",
          "url": "https://bugzilla.suse.com/1152082"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16276"
    },
    {
      "cve": "CVE-2019-17596",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17596"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17596",
          "url": "https://www.suse.com/security/cve/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1154402 for CVE-2019-17596",
          "url": "https://bugzilla.suse.com/1154402"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-17596"
    },
    {
      "cve": "CVE-2020-14039",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14039"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14039",
          "url": "https://www.suse.com/security/cve/CVE-2020-14039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174191 for CVE-2020-14039",
          "url": "https://bugzilla.suse.com/1174191"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-14039"
    },
    {
      "cve": "CVE-2020-15586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-15586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-15586",
          "url": "https://www.suse.com/security/cve/CVE-2020-15586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174153 for CVE-2020-15586",
          "url": "https://bugzilla.suse.com/1174153"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-15586"
    },
    {
      "cve": "CVE-2020-16845",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-16845"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
          "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-16845",
          "url": "https://www.suse.com/security/cve/CVE-2020-16845"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174977 for CVE-2020-16845",
          "url": "https://bugzilla.suse.com/1174977"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-doc-1.13.15-2.6.x86_64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.aarch64",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.ppc64le",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.s390x",
            "openSUSE Tumbleweed:go1.13-race-1.13.15-2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-16845"
    }
  ]
}
  opensuse-su-2019:2522-1
Vulnerability from csaf_opensuse
Published
2019-11-17 19:22
    Modified
2019-11-17 19:22
    Summary
Security update for go1.12
    Notes
Title of the patch
Security update for go1.12
    Description of the patch
This update for go1.12 fixes the following issues:
Security issues fixed:
- CVE-2019-16276: Fixed the handling of invalid HTTP headers, which had allowed request smuggling (bsc#1152082).
- CVE-2019-17596: Fixed a panic in dsa.Verify caused by invalid public keys (bsc#1154402).
Non-security issue fixed:
- Go was updated to version 1.12.12 (bsc#1141689).
This update was imported from the SUSE:SLE-15:Update update project.
    Patchnames
openSUSE-2019-2522
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for go1.12",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for go1.12 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-16276: Fixed the handling of invalid HTTP headers, which had allowed request smuggling (bsc#1152082).\n- CVE-2019-17596: Fixed a panic in dsa.Verify caused by invalid public keys (bsc#1154402).\n\nNon-security issue fixed:\n\n- Go was updated to version 1.12.12 (bsc#1141689).\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2019-2522",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2522-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2019:2522-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KTIT2JMBNVRUIPMN4T5GH6PMZ7DMP2AA/#KTIT2JMBNVRUIPMN4T5GH6PMZ7DMP2AA"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2019:2522-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KTIT2JMBNVRUIPMN4T5GH6PMZ7DMP2AA/#KTIT2JMBNVRUIPMN4T5GH6PMZ7DMP2AA"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1141689",
        "url": "https://bugzilla.suse.com/1141689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152082",
        "url": "https://bugzilla.suse.com/1152082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154402",
        "url": "https://bugzilla.suse.com/1154402"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16276 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16276/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17596 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17596/"
      }
    ],
    "title": "Security update for go1.12",
    "tracking": {
      "current_release_date": "2019-11-17T19:22:11Z",
      "generator": {
        "date": "2019-11-17T19:22:11Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2019:2522-1",
      "initial_release_date": "2019-11-17T19:22:11Z",
      "revision_history": [
        {
          "date": "2019-11-17T19:22:11Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.12-1.12.12-lp151.2.25.1.x86_64",
                "product": {
                  "name": "go1.12-1.12.12-lp151.2.25.1.x86_64",
                  "product_id": "go1.12-1.12.12-lp151.2.25.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.12-doc-1.12.12-lp151.2.25.1.x86_64",
                "product": {
                  "name": "go1.12-doc-1.12.12-lp151.2.25.1.x86_64",
                  "product_id": "go1.12-doc-1.12.12-lp151.2.25.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.12-race-1.12.12-lp151.2.25.1.x86_64",
                "product": {
                  "name": "go1.12-race-1.12.12-lp151.2.25.1.x86_64",
                  "product_id": "go1.12-race-1.12.12-lp151.2.25.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.1",
                "product": {
                  "name": "openSUSE Leap 15.1",
                  "product_id": "openSUSE Leap 15.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-1.12.12-lp151.2.25.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:go1.12-1.12.12-lp151.2.25.1.x86_64"
        },
        "product_reference": "go1.12-1.12.12-lp151.2.25.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-doc-1.12.12-lp151.2.25.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:go1.12-doc-1.12.12-lp151.2.25.1.x86_64"
        },
        "product_reference": "go1.12-doc-1.12.12-lp151.2.25.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-race-1.12.12-lp151.2.25.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:go1.12-race-1.12.12-lp151.2.25.1.x86_64"
        },
        "product_reference": "go1.12-race-1.12.12-lp151.2.25.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-16276",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16276"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:go1.12-1.12.12-lp151.2.25.1.x86_64",
          "openSUSE Leap 15.1:go1.12-doc-1.12.12-lp151.2.25.1.x86_64",
          "openSUSE Leap 15.1:go1.12-race-1.12.12-lp151.2.25.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16276",
          "url": "https://www.suse.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1152082 for CVE-2019-16276",
          "url": "https://bugzilla.suse.com/1152082"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:go1.12-1.12.12-lp151.2.25.1.x86_64",
            "openSUSE Leap 15.1:go1.12-doc-1.12.12-lp151.2.25.1.x86_64",
            "openSUSE Leap 15.1:go1.12-race-1.12.12-lp151.2.25.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:go1.12-1.12.12-lp151.2.25.1.x86_64",
            "openSUSE Leap 15.1:go1.12-doc-1.12.12-lp151.2.25.1.x86_64",
            "openSUSE Leap 15.1:go1.12-race-1.12.12-lp151.2.25.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-11-17T19:22:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16276"
    },
    {
      "cve": "CVE-2019-17596",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17596"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:go1.12-1.12.12-lp151.2.25.1.x86_64",
          "openSUSE Leap 15.1:go1.12-doc-1.12.12-lp151.2.25.1.x86_64",
          "openSUSE Leap 15.1:go1.12-race-1.12.12-lp151.2.25.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17596",
          "url": "https://www.suse.com/security/cve/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1154402 for CVE-2019-17596",
          "url": "https://bugzilla.suse.com/1154402"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:go1.12-1.12.12-lp151.2.25.1.x86_64",
            "openSUSE Leap 15.1:go1.12-doc-1.12.12-lp151.2.25.1.x86_64",
            "openSUSE Leap 15.1:go1.12-race-1.12.12-lp151.2.25.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Leap 15.1:go1.12-1.12.12-lp151.2.25.1.x86_64",
            "openSUSE Leap 15.1:go1.12-doc-1.12.12-lp151.2.25.1.x86_64",
            "openSUSE Leap 15.1:go1.12-race-1.12.12-lp151.2.25.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-11-17T19:22:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-17596"
    }
  ]
}
  opensuse-su-2024:10805-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
    Modified
2024-06-15 00:00
    Summary
go1.12-1.12.17-4.8 on GA media
    Notes
Title of the patch
go1.12-1.12.17-4.8 on GA media
    Description of the patch
These are all security issues fixed in the go1.12-1.12.17-4.8 package on the GA media of openSUSE Tumbleweed.
    Patchnames
openSUSE-Tumbleweed-2024-10805
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "go1.12-1.12.17-4.8 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the go1.12-1.12.17-4.8 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-10805",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10805-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2014-7189 page",
        "url": "https://www.suse.com/security/cve/CVE-2014-7189/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-8618 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-8618/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3959 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3959/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-5386 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-5386/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-15041 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-15041/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-15042 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-15042/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-8932 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-8932/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-16873 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-16873/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-16874 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-16874/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-16875 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-16875/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-6574 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-6574/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-11888 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-11888/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14809 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14809/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16276 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16276/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17596 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17596/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-6486 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-6486/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-9512 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-9512/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-9514 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-9514/"
      }
    ],
    "title": "go1.12-1.12.17-4.8 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:10805-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.12-1.12.17-4.8.aarch64",
                "product": {
                  "name": "go1.12-1.12.17-4.8.aarch64",
                  "product_id": "go1.12-1.12.17-4.8.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.12-doc-1.12.17-4.8.aarch64",
                "product": {
                  "name": "go1.12-doc-1.12.17-4.8.aarch64",
                  "product_id": "go1.12-doc-1.12.17-4.8.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.12-race-1.12.17-4.8.aarch64",
                "product": {
                  "name": "go1.12-race-1.12.17-4.8.aarch64",
                  "product_id": "go1.12-race-1.12.17-4.8.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.12-1.12.17-4.8.ppc64le",
                "product": {
                  "name": "go1.12-1.12.17-4.8.ppc64le",
                  "product_id": "go1.12-1.12.17-4.8.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "go1.12-doc-1.12.17-4.8.ppc64le",
                "product": {
                  "name": "go1.12-doc-1.12.17-4.8.ppc64le",
                  "product_id": "go1.12-doc-1.12.17-4.8.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "go1.12-race-1.12.17-4.8.ppc64le",
                "product": {
                  "name": "go1.12-race-1.12.17-4.8.ppc64le",
                  "product_id": "go1.12-race-1.12.17-4.8.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.12-1.12.17-4.8.s390x",
                "product": {
                  "name": "go1.12-1.12.17-4.8.s390x",
                  "product_id": "go1.12-1.12.17-4.8.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "go1.12-doc-1.12.17-4.8.s390x",
                "product": {
                  "name": "go1.12-doc-1.12.17-4.8.s390x",
                  "product_id": "go1.12-doc-1.12.17-4.8.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "go1.12-race-1.12.17-4.8.s390x",
                "product": {
                  "name": "go1.12-race-1.12.17-4.8.s390x",
                  "product_id": "go1.12-race-1.12.17-4.8.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "go1.12-1.12.17-4.8.x86_64",
                "product": {
                  "name": "go1.12-1.12.17-4.8.x86_64",
                  "product_id": "go1.12-1.12.17-4.8.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.12-doc-1.12.17-4.8.x86_64",
                "product": {
                  "name": "go1.12-doc-1.12.17-4.8.x86_64",
                  "product_id": "go1.12-doc-1.12.17-4.8.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "go1.12-race-1.12.17-4.8.x86_64",
                "product": {
                  "name": "go1.12-race-1.12.17-4.8.x86_64",
                  "product_id": "go1.12-race-1.12.17-4.8.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-1.12.17-4.8.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64"
        },
        "product_reference": "go1.12-1.12.17-4.8.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-1.12.17-4.8.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le"
        },
        "product_reference": "go1.12-1.12.17-4.8.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-1.12.17-4.8.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x"
        },
        "product_reference": "go1.12-1.12.17-4.8.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-1.12.17-4.8.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64"
        },
        "product_reference": "go1.12-1.12.17-4.8.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-doc-1.12.17-4.8.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64"
        },
        "product_reference": "go1.12-doc-1.12.17-4.8.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-doc-1.12.17-4.8.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le"
        },
        "product_reference": "go1.12-doc-1.12.17-4.8.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-doc-1.12.17-4.8.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x"
        },
        "product_reference": "go1.12-doc-1.12.17-4.8.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-doc-1.12.17-4.8.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64"
        },
        "product_reference": "go1.12-doc-1.12.17-4.8.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-race-1.12.17-4.8.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64"
        },
        "product_reference": "go1.12-race-1.12.17-4.8.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-race-1.12.17-4.8.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le"
        },
        "product_reference": "go1.12-race-1.12.17-4.8.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-race-1.12.17-4.8.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x"
        },
        "product_reference": "go1.12-race-1.12.17-4.8.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "go1.12-race-1.12.17-4.8.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        },
        "product_reference": "go1.12-race-1.12.17-4.8.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2014-7189",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2014-7189"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "crpyto/tls in Go 1.1 before 1.3.2, when SessionTicketsDisabled is enabled, allows man-in-the-middle attackers to spoof clients via unspecified vectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2014-7189",
          "url": "https://www.suse.com/security/cve/CVE-2014-7189"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 898901 for CVE-2014-7189",
          "url": "https://bugzilla.suse.com/898901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2014-7189"
    },
    {
      "cve": "CVE-2015-8618",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-8618"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Int.Exp Montgomery code in the math/big library in Go 1.5.x before 1.5.3 mishandles carry propagation and produces incorrect output, which makes it easier for attackers to obtain private RSA keys via unspecified vectors.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-8618",
          "url": "https://www.suse.com/security/cve/CVE-2015-8618"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 957814 for CVE-2015-8618",
          "url": "https://bugzilla.suse.com/957814"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 960151 for CVE-2015-8618",
          "url": "https://bugzilla.suse.com/960151"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2015-8618"
    },
    {
      "cve": "CVE-2016-3959",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3959"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3959",
          "url": "https://www.suse.com/security/cve/CVE-2016-3959"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 974232 for CVE-2016-3959",
          "url": "https://bugzilla.suse.com/974232"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-3959"
    },
    {
      "cve": "CVE-2016-5386",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-5386"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application\u0027s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-5386",
          "url": "https://www.suse.com/security/cve/CVE-2016-5386"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 988484 for CVE-2016-5386",
          "url": "https://bugzilla.suse.com/988484"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 988486 for CVE-2016-5386",
          "url": "https://bugzilla.suse.com/988486"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 988487 for CVE-2016-5386",
          "url": "https://bugzilla.suse.com/988487"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 988488 for CVE-2016-5386",
          "url": "https://bugzilla.suse.com/988488"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 988489 for CVE-2016-5386",
          "url": "https://bugzilla.suse.com/988489"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 988491 for CVE-2016-5386",
          "url": "https://bugzilla.suse.com/988491"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 988492 for CVE-2016-5386",
          "url": "https://bugzilla.suse.com/988492"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 989125 for CVE-2016-5386",
          "url": "https://bugzilla.suse.com/989125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 989174 for CVE-2016-5386",
          "url": "https://bugzilla.suse.com/989174"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-5386"
    },
    {
      "cve": "CVE-2017-15041",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-15041"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.8.4 and 1.9.x before 1.9.1 allows \"go get\" remote command execution. Using custom domains, it is possible to arrange things so that example.com/pkg1 points to a Subversion repository but example.com/pkg1/pkg2 points to a Git repository. If the Subversion repository includes a Git checkout in its pkg2 directory and some other work is done to ensure the proper ordering of operations, \"go get\" can be tricked into reusing this Git checkout for the fetch of code from pkg2. If the Subversion repository\u0027s Git checkout has malicious commands in .git/hooks/, they will execute on the system running \"go get.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-15041",
          "url": "https://www.suse.com/security/cve/CVE-2017-15041"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1062085 for CVE-2017-15041",
          "url": "https://bugzilla.suse.com/1062085"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2017-15041"
    },
    {
      "cve": "CVE-2017-15042",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-15042"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn\u0027t advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-15042",
          "url": "https://www.suse.com/security/cve/CVE-2017-15042"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1062087 for CVE-2017-15042",
          "url": "https://bugzilla.suse.com/1062087"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-15042"
    },
    {
      "cve": "CVE-2017-8932",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-8932"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to the derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-8932",
          "url": "https://www.suse.com/security/cve/CVE-2017-8932"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1040618 for CVE-2017-8932",
          "url": "https://bugzilla.suse.com/1040618"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-8932"
    },
    {
      "cve": "CVE-2018-16873",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-16873"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it\u0027s possible to arrange things so that a Git repository is cloned to a folder named \".git\" by using a vanity import path that ends with \"/.git\". If the Git repository root contains a \"HEAD\" file, a \"config\" file, an \"objects\" directory, a \"refs\" directory, with some work to ensure the proper ordering of operations, \"go get -u\" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the \"config\" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running \"go get -u\".",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-16873",
          "url": "https://www.suse.com/security/cve/CVE-2018-16873"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118897 for CVE-2018-16873",
          "url": "https://bugzilla.suse.com/1118897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118898 for CVE-2018-16873",
          "url": "https://bugzilla.suse.com/1118898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118899 for CVE-2018-16873",
          "url": "https://bugzilla.suse.com/1118899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-16873"
    },
    {
      "cve": "CVE-2018-16874",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-16874"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both \u0027{\u0027 and \u0027}\u0027 characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-16874",
          "url": "https://www.suse.com/security/cve/CVE-2018-16874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118897 for CVE-2018-16874",
          "url": "https://bugzilla.suse.com/1118897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118898 for CVE-2018-16874",
          "url": "https://bugzilla.suse.com/1118898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118899 for CVE-2018-16874",
          "url": "https://bugzilla.suse.com/1118899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-16874"
    },
    {
      "cve": "CVE-2018-16875",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-16875"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-16875",
          "url": "https://www.suse.com/security/cve/CVE-2018-16875"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118897 for CVE-2018-16875",
          "url": "https://bugzilla.suse.com/1118897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118898 for CVE-2018-16875",
          "url": "https://bugzilla.suse.com/1118898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118899 for CVE-2018-16875",
          "url": "https://bugzilla.suse.com/1118899"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-16875"
    },
    {
      "cve": "CVE-2018-6574",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-6574"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow \"go get\" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-6574",
          "url": "https://www.suse.com/security/cve/CVE-2018-6574"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1080006 for CVE-2018-6574",
          "url": "https://bugzilla.suse.com/1080006"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-6574"
    },
    {
      "cve": "CVE-2019-11888",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-11888"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go through 1.12.5 on Windows mishandles process creation with a nil environment in conjunction with a non-nil token, which allows attackers to obtain sensitive information or gain privileges.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-11888",
          "url": "https://www.suse.com/security/cve/CVE-2019-11888"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146203 for CVE-2019-11888",
          "url": "https://bugzilla.suse.com/1146203"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-11888"
    },
    {
      "cve": "CVE-2019-14809",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14809"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14809",
          "url": "https://www.suse.com/security/cve/CVE-2019-14809"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146123 for CVE-2019-14809",
          "url": "https://bugzilla.suse.com/1146123"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14809"
    },
    {
      "cve": "CVE-2019-16276",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16276"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16276",
          "url": "https://www.suse.com/security/cve/CVE-2019-16276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1152082 for CVE-2019-16276",
          "url": "https://bugzilla.suse.com/1152082"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16276"
    },
    {
      "cve": "CVE-2019-17596",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17596"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17596",
          "url": "https://www.suse.com/security/cve/CVE-2019-17596"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1154402 for CVE-2019-17596",
          "url": "https://bugzilla.suse.com/1154402"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-17596"
    },
    {
      "cve": "CVE-2019-6486",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-6486"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-6486",
          "url": "https://www.suse.com/security/cve/CVE-2019-6486"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1123013 for CVE-2019-6486",
          "url": "https://bugzilla.suse.com/1123013"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-6486"
    },
    {
      "cve": "CVE-2019-9512",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-9512"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-9512",
          "url": "https://www.suse.com/security/cve/CVE-2019-9512"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1145663 for CVE-2019-9512",
          "url": "https://bugzilla.suse.com/1145663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146099 for CVE-2019-9512",
          "url": "https://bugzilla.suse.com/1146099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146111 for CVE-2019-9512",
          "url": "https://bugzilla.suse.com/1146111"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1147142 for CVE-2019-9512",
          "url": "https://bugzilla.suse.com/1147142"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-9512"
    },
    {
      "cve": "CVE-2019-9514",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-9514"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
          "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-9514",
          "url": "https://www.suse.com/security/cve/CVE-2019-9514"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1145662 for CVE-2019-9514",
          "url": "https://bugzilla.suse.com/1145662"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1145663 for CVE-2019-9514",
          "url": "https://bugzilla.suse.com/1145663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146095 for CVE-2019-9514",
          "url": "https://bugzilla.suse.com/1146095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146115 for CVE-2019-9514",
          "url": "https://bugzilla.suse.com/1146115"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1147142 for CVE-2019-9514",
          "url": "https://bugzilla.suse.com/1147142"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-doc-1.12.17-4.8.x86_64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.aarch64",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.ppc64le",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.s390x",
            "openSUSE Tumbleweed:go1.12-race-1.12.17-4.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-9514"
    }
  ]
}
  cnvd-2019-35773
Vulnerability from cnvd
Title
Google Go环境问题漏洞
Description
Google Go是美国谷歌(Google)公司的一款静态强类型、编译型、并发型,并具有垃圾回收功能的编程语言。
Google Go 1.12.10之前版本和1.13.1之前的1.13.x版本中存在环境问题漏洞,攻击者可利用该漏洞绕过过滤器或实施请求走私攻击。
Severity
中
        VLAI Severity ?
      
      Patch Name
Google Go环境问题漏洞的补丁
Patch Description
Google Go是美国谷歌(Google)公司的一款静态强类型、编译型、并发型,并具有垃圾回收功能的编程语言。
Google Go 1.12.10之前版本和1.13.1之前的1.13.x版本中存在环境问题漏洞,攻击者可利用该漏洞绕过过滤器或实施请求走私攻击。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/golang/go/issues/34540
Reference
https://www.debian.org/security/2019/dsa-4534
https://www.auscert.org.au/bulletins/ESB-2019.3658/
https://access.redhat.com/security/cve/cve-2019-16276
Impacted products
          | Name | ['Google GO <1.12.10', 'Google GO 1.13.*,<1.13.1'] | 
|---|
{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2019-16276"
    }
  },
  "description": "Google Go\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u9759\u6001\u5f3a\u7c7b\u578b\u3001\u7f16\u8bd1\u578b\u3001\u5e76\u53d1\u578b\uff0c\u5e76\u5177\u6709\u5783\u573e\u56de\u6536\u529f\u80fd\u7684\u7f16\u7a0b\u8bed\u8a00\u3002\n\nGoogle Go 1.12.10\u4e4b\u524d\u7248\u672c\u548c1.13.1\u4e4b\u524d\u76841.13.x\u7248\u672c\u4e2d\u5b58\u5728\u73af\u5883\u95ee\u9898\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u8fc7\u6ee4\u5668\u6216\u5b9e\u65bd\u8bf7\u6c42\u8d70\u79c1\u653b\u51fb\u3002",
  "discovererName": "unknown",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/golang/go/issues/34540",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2019-35773",
  "openTime": "2019-10-17",
  "patchDescription": "Google Go\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u9759\u6001\u5f3a\u7c7b\u578b\u3001\u7f16\u8bd1\u578b\u3001\u5e76\u53d1\u578b\uff0c\u5e76\u5177\u6709\u5783\u573e\u56de\u6536\u529f\u80fd\u7684\u7f16\u7a0b\u8bed\u8a00\u3002\r\n\r\nGoogle Go 1.12.10\u4e4b\u524d\u7248\u672c\u548c1.13.1\u4e4b\u524d\u76841.13.x\u7248\u672c\u4e2d\u5b58\u5728\u73af\u5883\u95ee\u9898\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u8fc7\u6ee4\u5668\u6216\u5b9e\u65bd\u8bf7\u6c42\u8d70\u79c1\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Google Go\u73af\u5883\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Google GO \u003c1.12.10",
      "Google GO 1.13.*\uff0c\u003c1.13.1"
    ]
  },
  "referenceLink": "https://www.debian.org/security/2019/dsa-4534\r\nhttps://www.auscert.org.au/bulletins/ESB-2019.3658/\r\nhttps://access.redhat.com/security/cve/cve-2019-16276",
  "serverity": "\u4e2d",
  "submitTime": "2019-09-30",
  "title": "Google Go\u73af\u5883\u95ee\u9898\u6f0f\u6d1e"
}
  CERTFR-2025-AVI-0360
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Tenable. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
        | Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Sensor Proxy | Sensor Proxy version antérieures à 1.2.0 | ||
| Tenable | Identity Exposure | Identity Exposure versions antérieures à 3.77.11 | 
References
        | Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Sensor Proxy version ant\u00e9rieures \u00e0 1.2.0",
      "product": {
        "name": "Sensor Proxy",
        "vendor": {
          "name": "Tenable",
          "scada": false
        }
      }
    },
    {
      "description": "Identity Exposure versions ant\u00e9rieures \u00e0 3.77.11",
      "product": {
        "name": "Identity Exposure",
        "vendor": {
          "name": "Tenable",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-12797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
    },
    {
      "name": "CVE-2019-16276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16276"
    },
    {
      "name": "CVE-2025-32433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32433"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    }
  ],
  "initial_release_date": "2025-05-02T00:00:00",
  "last_revision_date": "2025-05-02T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0360",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-02T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Tenable. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Tenable",
  "vendor_advisories": [
    {
      "published_at": "2025-05-01",
      "title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-08",
      "url": "https://www.tenable.com/security/tns-2025-08"
    },
    {
      "published_at": "2025-04-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-07",
      "url": "https://www.tenable.com/security/tns-2025-07"
    }
  ]
}
  fkie_cve-2019-16276
Vulnerability from fkie_nvd
Published
2019-09-30 19:15
    Modified
2024-11-21 04:30
    
          Severity ?
        
        
    Summary
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
    References
      | URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2020:0101 | Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2020:0329 | Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2020:0652 | Third Party Advisory | |
| cve@mitre.org | https://github.com/golang/go/issues/34540 | Patch, Third Party Advisory | |
| cve@mitre.org | https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ | ||
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/ | ||
| cve@mitre.org | https://security.netapp.com/advisory/ntap-20191122-0004/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2020:0101 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2020:0329 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2020:0652 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/golang/go/issues/34540 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20191122-0004/ | Third Party Advisory | 
Impacted products
      | Vendor | Product | Version | |
|---|---|---|---|
| golang | go | * | |
| golang | go | * | |
| debian | debian_linux | 9.0 | |
| opensuse | leap | 15.0 | |
| opensuse | leap | 15.1 | |
| fedoraproject | fedora | 29 | |
| fedoraproject | fedora | 30 | |
| fedoraproject | fedora | 31 | |
| redhat | openshift_container_platform | 4.2 | |
| redhat | enterprise_linux | 7.0 | |
| redhat | developer_tools | 1.0 | |
| redhat | enterprise_linux | 8.0 | |
| redhat | enterprise_linux_eus | 8.1 | |
| netapp | cloud_insights_telegraf_agent | - | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "780FC85E-2CAD-4605-8DA2-CE16EB2034A5",
              "versionEndExcluding": "1.12.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FDA5CF5-27C2-4DA5-852D-1A69271DB7EE",
              "versionEndExcluding": "1.13.1",
              "versionStartIncluding": "1.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C85A84D-A70F-4B02-9E5D-CD9660ABF048",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60937D60-6B78-400F-8D30-7FCF328659A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "92BC9265-6959-4D37-BE5E-8C45E98992F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:cloud_insights_telegraf_agent:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DAE7369-EEC5-405E-9D13-858335FDA647",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling."
    },
    {
      "lang": "es",
      "value": "Go versiones anteriores a 1.12.10 y versiones 1.13.x anteriores a 1.13.1, permitir el Trafico No Autorizado de Peticiones HTTP."
    }
  ],
  "id": "CVE-2019-16276",
  "lastModified": "2024-11-21T04:30:26.170",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-09-30T19:15:08.790",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2020:0101"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2020:0329"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2020:0652"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/golang/go/issues/34540"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20191122-0004/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2020:0101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2020:0329"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2020:0652"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/golang/go/issues/34540"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20191122-0004/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-444"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  ghsa-xv7j-jr8q-mhmm
Vulnerability from github
Published
2022-05-24 16:57
    Modified
2022-05-24 16:57
    
        VLAI Severity ?
      
      Details
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
{
  "affected": [],
  "aliases": [
    "CVE-2019-16276"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-444"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2019-09-30T19:15:00Z",
    "severity": "HIGH"
  },
  "details": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.",
  "id": "GHSA-xv7j-jr8q-mhmm",
  "modified": "2022-05-24T16:57:06Z",
  "published": "2022-05-24T16:57:06Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16276"
    },
    {
      "type": "WEB",
      "url": "https://github.com/golang/go/issues/34540"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2020:0101"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2020:0329"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2020:0652"
    },
    {
      "type": "WEB",
      "url": "https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG"
    },
    {
      "type": "WEB",
      "url": "https://security.netapp.com/advisory/ntap-20191122-0004"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}
  Loading…
      Loading…
      Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
 
Loading…
      Loading…